Vol. 3 Issue 1
Year: 2015
Issue:Mar-May
Title:Malware Attack by Using IIMDPS
Author Name:S. Murugan and K. Kuppusamy
Synopsis:
This paper focuses on preventing Unknown Malware attack by using Intelligence Intrusion Multi Detection Prevention System (IIDPS). It describes the state's overall requirements regarding the acquisition of preventing unknown malware with the help of mathematical scheme (Euler Diagram, Allen Algebra) and a few models with newly designed algorithm. It is designed to provide a deeper understanding of existing intrusion detection principles with intelligence strategies, that will be responsible for acquiring unknown malware. It compares the false positive rate and false negative rate, which will be proven by conducting different experiments with WEKA simulation.
Year: 2015
Issue:Mar-May
Title:Malware Attack by Using IIMDPS
Author Name:S. Murugan and K. Kuppusamy
Synopsis:
This paper focuses on preventing Unknown Malware attack by using Intelligence Intrusion Multi Detection Prevention System (IIDPS). It describes the state's overall requirements regarding the acquisition of preventing unknown malware with the help of mathematical scheme (Euler Diagram, Allen Algebra) and a few models with newly designed algorithm. It is designed to provide a deeper understanding of existing intrusion detection principles with intelligence strategies, that will be responsible for acquiring unknown malware. It compares the false positive rate and false negative rate, which will be proven by conducting different experiments with WEKA simulation.
No comments:
Post a Comment