Design of Network Intrusion Detection based on Data Mining

碩士 === 國立臺灣科技大學 === 電機工程系 === 91 === This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into...

Full description

Bibliographic Details
Main Authors: Meng-Shian You, 游孟修
Other Authors: Nai-Jian Wang
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/36712237140626366627
id ndltd-TW-091NTUST442087
record_format oai_dc
spelling ndltd-TW-091NTUST4420872016-06-20T04:16:01Z http://ndltd.ncl.edu.tw/handle/36712237140626366627 Design of Network Intrusion Detection based on Data Mining 基於資料探勘的網路異常偵測設計 Meng-Shian You 游孟修 碩士 國立臺灣科技大學 電機工程系 91 This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into a new algorithm and apply this algorithm to custom intrusion detection filters. Our algorithm can extract extensive sets of features that describe each network connection, and learn rules that exactly capture the behavior of intrusion and normal activities. Finally, some examples are given to demonstrate the performance and the validity of this algorithm. Nai-Jian Wang 王乃堅 2003 學位論文 ; thesis 87 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 電機工程系 === 91 === This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into a new algorithm and apply this algorithm to custom intrusion detection filters. Our algorithm can extract extensive sets of features that describe each network connection, and learn rules that exactly capture the behavior of intrusion and normal activities. Finally, some examples are given to demonstrate the performance and the validity of this algorithm.
author2 Nai-Jian Wang
author_facet Nai-Jian Wang
Meng-Shian You
游孟修
author Meng-Shian You
游孟修
spellingShingle Meng-Shian You
游孟修
Design of Network Intrusion Detection based on Data Mining
author_sort Meng-Shian You
title Design of Network Intrusion Detection based on Data Mining
title_short Design of Network Intrusion Detection based on Data Mining
title_full Design of Network Intrusion Detection based on Data Mining
title_fullStr Design of Network Intrusion Detection based on Data Mining
title_full_unstemmed Design of Network Intrusion Detection based on Data Mining
title_sort design of network intrusion detection based on data mining
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/36712237140626366627
work_keys_str_mv AT mengshianyou designofnetworkintrusiondetectionbasedondatamining
AT yóumèngxiū designofnetworkintrusiondetectionbasedondatamining
AT mengshianyou jīyúzīliàotànkāndewǎnglùyìchángzhēncèshèjì
AT yóumèngxiū jīyúzīliàotànkāndewǎnglùyìchángzhēncèshèjì
_version_ 1718311760974315520