Intrusion Detection and Identification System Using Data Mining and Profiling Techniques
碩士 === 東海大學 === 資訊工程與科學系 === 96 === Presently, most computers authenticate a user’s ID and password before the user can log in. However, if the two items are known to hackers, there is a risk of security breach. In this paper, we propose a system, named the Intrusion Detection and Identification Sys...
Main Authors: | Kai-Wei Hu, 胡凱崴 |
---|---|
Other Authors: | Fang-Yie Leu |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10740359320702429798 |
Similar Items
-
A Real-Time Intrusion Detection System using Data Mining Technique
by: Fang-Yie Leu, et al.
Published: (2008-04-01) -
Applying Data Mining Techniques on Intrusion Detection Systems
by: Chuang, Kuo-Wei, et al.
Published: (2010) -
Improving intrusion detection systems using data mining techniques
by: Almutairi, Abdulrazaq Z.
Published: (2016) -
DATA MINING TECHNIQUES FOR SIGNATURE SEARCH IN NETWORK INTRUSION DETECTION
by: Shau-Wei Lin, et al.
Published: (2004) -
Effective approach toward Intrusion Detection System using data mining techniques
by: G.V. Nadiammai, et al.
Published: (2014-03-01)