K. C. Nalavade

Learn More
With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but(More)
Classifying data is a common task in machine learning. In machine learning, statistical classification is the problem of identifying the sub-population to which new observations belong on the basis of a training set of data containing observations whose sub-population is known. Therefore these classifications will show a variable behavior which can be(More)
In the current age Intrusion detection is an interest in and challenging area. As there are now a few exploration works are as of now done and the outcome change is in advancement. In this paper a hybrid approach has been proposed which is based on association rule mining and Selective Iteration based Particle Swarm Optimization (SIPSO). The NSL-KDD dataset(More)
With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. It is becoming more demanding due to increasing network traffic and data on Internet. There are various approaches being utilized in intrusion detections, but(More)
TCP/IP protocol suite, the adapted standard for communication over network, suffers from inherent vulnerabilities in the design of underlying protocols. These vulnerabilities are the main source of various attacks. Security protocols are included in the original TCP/IP suite to provide integrity, availability and confidentiality to the data moving on(More)
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. If the attacks are detected successfully, then preventive measures for(More)
  • 1