SlideShare a Scribd company logo
1 of 18
NETWORK SECURITY USING
DATA MINING CONCEPTS
A
SEMINAR ON:
SUBMITTED TO:
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR
GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
OUTLINE
INTRODUCTION
SECURITY THREATS
DATA MINING
NETWORK SECURITY
INTEGRATION OF DATA MINING CONCEPTS
WITH NETWORK SECURITY
SYSTEM STRUCTURE
ADVANTAGES
CONCLUSION
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
INTRODUCTION
 Network Security is a major part of a network that needs
to be maintained because information is being passed
between computers etc. and is very vulnerable to attack.
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data mining is integrated with network security and can
be used with various security tools as well as hacking
tool.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
TYPES OF ATTACK ON NETWORK
ACTIVE ATTACK PASSIVE ATTACK
An event which can target the security region with the
intension to harm/access the system without
authentication is called Security Threats.
Attack is an action is taken against a target with the
intension of doing harm.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
 ACTIVE ATTACK: An active attack attempts to alter
system resources or affect their operations.
 PASSIVE ATTACK: A passive attack attempts to learn or
make use of information from the system but does not
affects system resources.
Some other attacks are:
 DISTRIBUTED ATTACK
 INSIDER ATTACK
 CLOSE-IN ATTACK
 PHISHING ATTACK
 HIJACK ATTACK
 PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
VIRUSES AND WORMS
TROJAN HORSES
SPAM
PHISHING
PACKET SNIFFERS
MALICIOUSLY CODED WEBSITES
PASSWORD ATTACKS
HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS
SHARED COMPUTERS
ZOMBIE COMPUTERS AND BOTNETS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data Mining is the process of analysing data from
different perspectives and summarising it into useful
information.
 Data Mining is the process of finding co-relations or
patterns among several fields in large relational
database.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR NETWORK SECURITY
Data Mining is being applied to problems such as intrusion
detection and auditing.
 ANAMOLY DETECTION TECHNIQUES could be used to
detect unusual patterns and behaviours.
 LINK ANALYSIS may be used to trace self propagating
malicious code to its authors.
 CLASSIFICATION may be used to group various cyber
attacks and then use the profiles to detect an attack when
it occurs.
 PREDICTION may be used to determine potential future
attacks depending in a way on information learnt about
terrorist through E-Mail and Phone conversations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
An Intrusion can be defined as any set of action that attempt to
compromise the integrity, confidentiality or availability of a
resource.
TECHNIQUES OF IDS
Anomaly Detection System Misuse Detection System
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
TYPES OF IDS:
Host Based
Detects attacks against a single host.
Distributed IDS
Detects attacks involving multiple hosts.
Network Based IDS
Detects attacks from any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
NETWORK SECURITY
Network Security consist of the policies adopted to prevent
and monitor unauthorized access, misuse, modification or
Daniel of computer networks and network accessible
resources.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
PASSWORD DISCOVERY TABLE
# OF
CHARACTER
POSSIBLE
COMBINATION
1 36
2 1300
5 6 Crore
HUMAN COMPUTER
3 Min .000018 Sec
2 Hours .00065 Sec
10 Years 30 Sec
 Possible character includes the letter A-Z and Numbers 0-9.
 Human discovery assumes 1 try in every second.
 Computer discovery assumes 1 Million tries per second.
 Average time assumes the password would be discovered in approximately half
the time it would take to try all possible combinations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ARCHITECTURE OF
DATAMINING IN ETHICAL HACKING TOOLS
DATA SOURCE
1
DATA SOURCE
2
DATA SOURCE
3
DATA
WAREHOUSE
ETHICAL
HACKING
TOOLS
ETL
TOOL
Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
WORM DETECTION
Worms are self replicating program, that exploits software
vulnerability on a victim or remotely infects other victims.
TYPES OF WORMS:
 E-mail Worms
 Instant Messaging Worms
 Internet Worms
 File Sharing Network Worms
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ADVANTAGES
 Consumes very less time in various network tools for
decrypting password and other information.
 Easy to implement such system.
 Helps to record unwanted and unauthorized access on
any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
CONCLUSION
The result of mining in network security may be to discover
following type of new information.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
 Protection from unauthorized access.
 Blocking of IP in case when wrong password attempted several
times.
 Helps in prevention from various terrorist attacks by recording
their information.
 Concept can be implemented in various system like: IDS, WORM
DETECTION etc.
 Helps in Brute Force attack, Password cracking etc.
THANK YOU

More Related Content

What's hot

Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...IJCSIS Research Publications
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 

What's hot (20)

DM for IDS
DM for IDSDM for IDS
DM for IDS
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 

Viewers also liked

Data mining cyber security
Data mining   cyber securityData mining   cyber security
Data mining cyber securityAmir Razmjou
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 
Artificial Intelligence: Data Mining
Artificial Intelligence: Data MiningArtificial Intelligence: Data Mining
Artificial Intelligence: Data MiningThe Integral Worm
 
Intruders
IntrudersIntruders
Intruderstechn
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar reportmayurik19
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Miningidnats
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (10)

Data mining cyber security
Data mining   cyber securityData mining   cyber security
Data mining cyber security
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Artificial Intelligence: Data Mining
Artificial Intelligence: Data MiningArtificial Intelligence: Data Mining
Artificial Intelligence: Data Mining
 
Intruders
IntrudersIntruders
Intruders
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Data mining
Data miningData mining
Data mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Network security using data mining concepts

Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...IJECEIAES
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 

Similar to Network security using data mining concepts (20)

Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
D03302030036
D03302030036D03302030036
D03302030036
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Network security
Network security Network security
Network security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Data security
Data securityData security
Data security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Network security using data mining concepts

  • 1. NETWORK SECURITY USING DATA MINING CONCEPTS A SEMINAR ON: SUBMITTED TO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
  • 2.
  • 3. OUTLINE INTRODUCTION SECURITY THREATS DATA MINING NETWORK SECURITY INTEGRATION OF DATA MINING CONCEPTS WITH NETWORK SECURITY SYSTEM STRUCTURE ADVANTAGES CONCLUSION INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 4. INTRODUCTION  Network Security is a major part of a network that needs to be maintained because information is being passed between computers etc. and is very vulnerable to attack.  Data Mining is the process of extraction of required/specific information from data in database.  Data mining is integrated with network security and can be used with various security tools as well as hacking tool. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 5. SECURITY THREATS TYPES OF ATTACK ON NETWORK ACTIVE ATTACK PASSIVE ATTACK An event which can target the security region with the intension to harm/access the system without authentication is called Security Threats. Attack is an action is taken against a target with the intension of doing harm. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 6. SECURITY THREATS  ACTIVE ATTACK: An active attack attempts to alter system resources or affect their operations.  PASSIVE ATTACK: A passive attack attempts to learn or make use of information from the system but does not affects system resources. Some other attacks are:  DISTRIBUTED ATTACK  INSIDER ATTACK  CLOSE-IN ATTACK  PHISHING ATTACK  HIJACK ATTACK  PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 7. SECURITY THREATS VIRUSES AND WORMS TROJAN HORSES SPAM PHISHING PACKET SNIFFERS MALICIOUSLY CODED WEBSITES PASSWORD ATTACKS HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS SHARED COMPUTERS ZOMBIE COMPUTERS AND BOTNETS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 8. DATA MINING  Data Mining is the process of extraction of required/specific information from data in database.  Data Mining is the process of analysing data from different perspectives and summarising it into useful information.  Data Mining is the process of finding co-relations or patterns among several fields in large relational database. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 9. DATA MINING FOR NETWORK SECURITY Data Mining is being applied to problems such as intrusion detection and auditing.  ANAMOLY DETECTION TECHNIQUES could be used to detect unusual patterns and behaviours.  LINK ANALYSIS may be used to trace self propagating malicious code to its authors.  CLASSIFICATION may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs.  PREDICTION may be used to determine potential future attacks depending in a way on information learnt about terrorist through E-Mail and Phone conversations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 10. DATA MINING FOR INTRUSION DETECTION An Intrusion can be defined as any set of action that attempt to compromise the integrity, confidentiality or availability of a resource. TECHNIQUES OF IDS Anomaly Detection System Misuse Detection System INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 11. DATA MINING FOR INTRUSION DETECTION TYPES OF IDS: Host Based Detects attacks against a single host. Distributed IDS Detects attacks involving multiple hosts. Network Based IDS Detects attacks from any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 12. NETWORK SECURITY Network Security consist of the policies adopted to prevent and monitor unauthorized access, misuse, modification or Daniel of computer networks and network accessible resources. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 13. PASSWORD DISCOVERY TABLE # OF CHARACTER POSSIBLE COMBINATION 1 36 2 1300 5 6 Crore HUMAN COMPUTER 3 Min .000018 Sec 2 Hours .00065 Sec 10 Years 30 Sec  Possible character includes the letter A-Z and Numbers 0-9.  Human discovery assumes 1 try in every second.  Computer discovery assumes 1 Million tries per second.  Average time assumes the password would be discovered in approximately half the time it would take to try all possible combinations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 14. ARCHITECTURE OF DATAMINING IN ETHICAL HACKING TOOLS DATA SOURCE 1 DATA SOURCE 2 DATA SOURCE 3 DATA WAREHOUSE ETHICAL HACKING TOOLS ETL TOOL Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 15. WORM DETECTION Worms are self replicating program, that exploits software vulnerability on a victim or remotely infects other victims. TYPES OF WORMS:  E-mail Worms  Instant Messaging Worms  Internet Worms  File Sharing Network Worms INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 16. ADVANTAGES  Consumes very less time in various network tools for decrypting password and other information.  Easy to implement such system.  Helps to record unwanted and unauthorized access on any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 17. CONCLUSION The result of mining in network security may be to discover following type of new information. INSTITUTE OF TECHNOLOGY AND MANAGEMENT  Protection from unauthorized access.  Blocking of IP in case when wrong password attempted several times.  Helps in prevention from various terrorist attacks by recording their information.  Concept can be implemented in various system like: IDS, WORM DETECTION etc.  Helps in Brute Force attack, Password cracking etc.