Design of Network Intrusion Detection based on Data Mining
碩士 === 國立臺灣科技大學 === 電機工程系 === 91 === This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/36712237140626366627 |
id |
ndltd-TW-091NTUST442087 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091NTUST4420872016-06-20T04:16:01Z http://ndltd.ncl.edu.tw/handle/36712237140626366627 Design of Network Intrusion Detection based on Data Mining 基於資料探勘的網路異常偵測設計 Meng-Shian You 游孟修 碩士 國立臺灣科技大學 電機工程系 91 This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into a new algorithm and apply this algorithm to custom intrusion detection filters. Our algorithm can extract extensive sets of features that describe each network connection, and learn rules that exactly capture the behavior of intrusion and normal activities. Finally, some examples are given to demonstrate the performance and the validity of this algorithm. Nai-Jian Wang 王乃堅 2003 學位論文 ; thesis 87 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 電機工程系 === 91 === This thesis presents an approach to detect custom intrusion based on data mining framework. In this framework, custom intrusion detection is thought of as a classification. The idea is to integrate the advantage of fuzzy theory and neural networks into a new algorithm and apply this algorithm to custom intrusion detection filters. Our algorithm can extract extensive sets of features that describe each network connection, and learn rules that exactly capture the behavior of intrusion and normal activities. Finally, some examples are given to demonstrate the performance and the validity of this algorithm.
|
author2 |
Nai-Jian Wang |
author_facet |
Nai-Jian Wang Meng-Shian You 游孟修 |
author |
Meng-Shian You 游孟修 |
spellingShingle |
Meng-Shian You 游孟修 Design of Network Intrusion Detection based on Data Mining |
author_sort |
Meng-Shian You |
title |
Design of Network Intrusion Detection based on Data Mining |
title_short |
Design of Network Intrusion Detection based on Data Mining |
title_full |
Design of Network Intrusion Detection based on Data Mining |
title_fullStr |
Design of Network Intrusion Detection based on Data Mining |
title_full_unstemmed |
Design of Network Intrusion Detection based on Data Mining |
title_sort |
design of network intrusion detection based on data mining |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/36712237140626366627 |
work_keys_str_mv |
AT mengshianyou designofnetworkintrusiondetectionbasedondatamining AT yóumèngxiū designofnetworkintrusiondetectionbasedondatamining AT mengshianyou jīyúzīliàotànkāndewǎnglùyìchángzhēncèshèjì AT yóumèngxiū jīyúzīliàotànkāndewǎnglùyìchángzhēncèshèjì |
_version_ |
1718311760974315520 |