SlideShare uma empresa Scribd logo
1 de 18
NETWORK SECURITY USING
DATA MINING CONCEPTS
A
SEMINAR ON:
SUBMITTED TO:
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR
GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
OUTLINE
INTRODUCTION
SECURITY THREATS
DATA MINING
NETWORK SECURITY
INTEGRATION OF DATA MINING CONCEPTS
WITH NETWORK SECURITY
SYSTEM STRUCTURE
ADVANTAGES
CONCLUSION
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
INTRODUCTION
 Network Security is a major part of a network that needs
to be maintained because information is being passed
between computers etc. and is very vulnerable to attack.
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data mining is integrated with network security and can
be used with various security tools as well as hacking
tool.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
TYPES OF ATTACK ON NETWORK
ACTIVE ATTACK PASSIVE ATTACK
An event which can target the security region with the
intension to harm/access the system without
authentication is called Security Threats.
Attack is an action is taken against a target with the
intension of doing harm.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
 ACTIVE ATTACK: An active attack attempts to alter
system resources or affect their operations.
 PASSIVE ATTACK: A passive attack attempts to learn or
make use of information from the system but does not
affects system resources.
Some other attacks are:
 DISTRIBUTED ATTACK
 INSIDER ATTACK
 CLOSE-IN ATTACK
 PHISHING ATTACK
 HIJACK ATTACK
 PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
SECURITY THREATS
VIRUSES AND WORMS
TROJAN HORSES
SPAM
PHISHING
PACKET SNIFFERS
MALICIOUSLY CODED WEBSITES
PASSWORD ATTACKS
HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS
SHARED COMPUTERS
ZOMBIE COMPUTERS AND BOTNETS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING
 Data Mining is the process of extraction of
required/specific information from data in database.
 Data Mining is the process of analysing data from
different perspectives and summarising it into useful
information.
 Data Mining is the process of finding co-relations or
patterns among several fields in large relational
database.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR NETWORK SECURITY
Data Mining is being applied to problems such as intrusion
detection and auditing.
 ANAMOLY DETECTION TECHNIQUES could be used to
detect unusual patterns and behaviours.
 LINK ANALYSIS may be used to trace self propagating
malicious code to its authors.
 CLASSIFICATION may be used to group various cyber
attacks and then use the profiles to detect an attack when
it occurs.
 PREDICTION may be used to determine potential future
attacks depending in a way on information learnt about
terrorist through E-Mail and Phone conversations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
An Intrusion can be defined as any set of action that attempt to
compromise the integrity, confidentiality or availability of a
resource.
TECHNIQUES OF IDS
Anomaly Detection System Misuse Detection System
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DATA MINING FOR INTRUSION DETECTION
TYPES OF IDS:
Host Based
Detects attacks against a single host.
Distributed IDS
Detects attacks involving multiple hosts.
Network Based IDS
Detects attacks from any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
NETWORK SECURITY
Network Security consist of the policies adopted to prevent
and monitor unauthorized access, misuse, modification or
Daniel of computer networks and network accessible
resources.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
PASSWORD DISCOVERY TABLE
# OF
CHARACTER
POSSIBLE
COMBINATION
1 36
2 1300
5 6 Crore
HUMAN COMPUTER
3 Min .000018 Sec
2 Hours .00065 Sec
10 Years 30 Sec
 Possible character includes the letter A-Z and Numbers 0-9.
 Human discovery assumes 1 try in every second.
 Computer discovery assumes 1 Million tries per second.
 Average time assumes the password would be discovered in approximately half
the time it would take to try all possible combinations.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ARCHITECTURE OF
DATAMINING IN ETHICAL HACKING TOOLS
DATA SOURCE
1
DATA SOURCE
2
DATA SOURCE
3
DATA
WAREHOUSE
ETHICAL
HACKING
TOOLS
ETL
TOOL
Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
WORM DETECTION
Worms are self replicating program, that exploits software
vulnerability on a victim or remotely infects other victims.
TYPES OF WORMS:
 E-mail Worms
 Instant Messaging Worms
 Internet Worms
 File Sharing Network Worms
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
ADVANTAGES
 Consumes very less time in various network tools for
decrypting password and other information.
 Easy to implement such system.
 Helps to record unwanted and unauthorized access on
any network.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
CONCLUSION
The result of mining in network security may be to discover
following type of new information.
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
 Protection from unauthorized access.
 Blocking of IP in case when wrong password attempted several
times.
 Helps in prevention from various terrorist attacks by recording
their information.
 Concept can be implemented in various system like: IDS, WORM
DETECTION etc.
 Helps in Brute Force attack, Password cracking etc.
THANK YOU

Mais conteúdo relacionado

Mais procurados

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
IAEME Publication
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
ijcsbi
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 

Mais procurados (20)

DM for IDS
DM for IDSDM for IDS
DM for IDS
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 

Destaque (10)

Data mining cyber security
Data mining   cyber securityData mining   cyber security
Data mining cyber security
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Artificial Intelligence: Data Mining
Artificial Intelligence: Data MiningArtificial Intelligence: Data Mining
Artificial Intelligence: Data Mining
 
Intruders
IntrudersIntruders
Intruders
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Data mining
Data miningData mining
Data mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Semelhante a Network security using data mining concepts

Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
OllieShoresna
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
IJECEIAES
 

Semelhante a Network security using data mining concepts (20)

Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
D03302030036
D03302030036D03302030036
D03302030036
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Network security
Network security Network security
Network security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Data security
Data securityData security
Data security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Network security using data mining concepts

  • 1. NETWORK SECURITY USING DATA MINING CONCEPTS A SEMINAR ON: SUBMITTED TO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INSTITUTE OF TECHNOLOGY AND MANAGEMENT, GIDA, GORAKHPUR GUIDE: MR. NAFEES AKHTER FAROOQUI BY: JAIDEEP GHOSH
  • 2.
  • 3. OUTLINE INTRODUCTION SECURITY THREATS DATA MINING NETWORK SECURITY INTEGRATION OF DATA MINING CONCEPTS WITH NETWORK SECURITY SYSTEM STRUCTURE ADVANTAGES CONCLUSION INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 4. INTRODUCTION  Network Security is a major part of a network that needs to be maintained because information is being passed between computers etc. and is very vulnerable to attack.  Data Mining is the process of extraction of required/specific information from data in database.  Data mining is integrated with network security and can be used with various security tools as well as hacking tool. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 5. SECURITY THREATS TYPES OF ATTACK ON NETWORK ACTIVE ATTACK PASSIVE ATTACK An event which can target the security region with the intension to harm/access the system without authentication is called Security Threats. Attack is an action is taken against a target with the intension of doing harm. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 6. SECURITY THREATS  ACTIVE ATTACK: An active attack attempts to alter system resources or affect their operations.  PASSIVE ATTACK: A passive attack attempts to learn or make use of information from the system but does not affects system resources. Some other attacks are:  DISTRIBUTED ATTACK  INSIDER ATTACK  CLOSE-IN ATTACK  PHISHING ATTACK  HIJACK ATTACK  PASSWORD ATTACK INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 7. SECURITY THREATS VIRUSES AND WORMS TROJAN HORSES SPAM PHISHING PACKET SNIFFERS MALICIOUSLY CODED WEBSITES PASSWORD ATTACKS HARDWARE ATTACKS AND RESIDUAL DATA FRAGMENTS SHARED COMPUTERS ZOMBIE COMPUTERS AND BOTNETS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 8. DATA MINING  Data Mining is the process of extraction of required/specific information from data in database.  Data Mining is the process of analysing data from different perspectives and summarising it into useful information.  Data Mining is the process of finding co-relations or patterns among several fields in large relational database. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 9. DATA MINING FOR NETWORK SECURITY Data Mining is being applied to problems such as intrusion detection and auditing.  ANAMOLY DETECTION TECHNIQUES could be used to detect unusual patterns and behaviours.  LINK ANALYSIS may be used to trace self propagating malicious code to its authors.  CLASSIFICATION may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs.  PREDICTION may be used to determine potential future attacks depending in a way on information learnt about terrorist through E-Mail and Phone conversations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 10. DATA MINING FOR INTRUSION DETECTION An Intrusion can be defined as any set of action that attempt to compromise the integrity, confidentiality or availability of a resource. TECHNIQUES OF IDS Anomaly Detection System Misuse Detection System INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 11. DATA MINING FOR INTRUSION DETECTION TYPES OF IDS: Host Based Detects attacks against a single host. Distributed IDS Detects attacks involving multiple hosts. Network Based IDS Detects attacks from any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 12. NETWORK SECURITY Network Security consist of the policies adopted to prevent and monitor unauthorized access, misuse, modification or Daniel of computer networks and network accessible resources. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 13. PASSWORD DISCOVERY TABLE # OF CHARACTER POSSIBLE COMBINATION 1 36 2 1300 5 6 Crore HUMAN COMPUTER 3 Min .000018 Sec 2 Hours .00065 Sec 10 Years 30 Sec  Possible character includes the letter A-Z and Numbers 0-9.  Human discovery assumes 1 try in every second.  Computer discovery assumes 1 Million tries per second.  Average time assumes the password would be discovered in approximately half the time it would take to try all possible combinations. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 14. ARCHITECTURE OF DATAMINING IN ETHICAL HACKING TOOLS DATA SOURCE 1 DATA SOURCE 2 DATA SOURCE 3 DATA WAREHOUSE ETHICAL HACKING TOOLS ETL TOOL Fig:1 WORKING ARCHITECTURE OF DATA MINING IN ETHICAL HACKING TOOLS INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 15. WORM DETECTION Worms are self replicating program, that exploits software vulnerability on a victim or remotely infects other victims. TYPES OF WORMS:  E-mail Worms  Instant Messaging Worms  Internet Worms  File Sharing Network Worms INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 16. ADVANTAGES  Consumes very less time in various network tools for decrypting password and other information.  Easy to implement such system.  Helps to record unwanted and unauthorized access on any network. INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • 17. CONCLUSION The result of mining in network security may be to discover following type of new information. INSTITUTE OF TECHNOLOGY AND MANAGEMENT  Protection from unauthorized access.  Blocking of IP in case when wrong password attempted several times.  Helps in prevention from various terrorist attacks by recording their information.  Concept can be implemented in various system like: IDS, WORM DETECTION etc.  Helps in Brute Force attack, Password cracking etc.