Entropy Based Approach for Analyzing Log Files for Postmortem Intrusion Detection

  • Mansi R. Pawar et al.

Abstract

Security is constantly an essential worry of any association. It is important to actualize an intrusion
Detection System (IDS) which will have the option to recognize the malevolent exercises over a system or
single framework. After assault it is imperative to break down what gatecrasher has done in the wake of
gaining admittance to framework, what are the territories he attempted to enter? To distinguish movement
of interloper from colossal log document is troublesome. Here framework is structured, which utilizes fluffy
k mean grouping alongside HMM to assemble model for perfect conduct of client. Considering the way that
gatecrasher movement design is not quite the same as would be expected client a model for location is
manufactured. The information log document is exceptionally huge subsequently sequitur is utilized to
decrease the size of record and windowing is utilized to process the information effectively. This framework
falls under irregularity based interruption recognition framework which runs disconnected to point assault
succession.

Published
2020-05-20