To see the other types of publications on this topic, follow the link: Intrusion Detection Algorithm.

Dissertations / Theses on the topic 'Intrusion Detection Algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Intrusion Detection Algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Janagam, Anirudh, and Saddam Hossen. "Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm)." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pillay, Manju Mohan. "Applying genetic algorithm techniques in network intrusion detection systems / Pillai, M.M." Thesis, North-West University, 2011. http://hdl.handle.net/10394/7030.

Full text
Abstract:
he Internet has grown to an essential media for human beings that facilitate communication, information searching, banking, marketing, online education and advertising among the numerous use cases that it offers. The benefits that are offered by the Internet are negated due to the fact that the intruders abuse and compromise the Internet through sophisticated cybercrimes and computer crimes. Cybercrime and computer crime has caused great havoc and panic in the Internet usage and network security. As a result it has become very important to protect the information residing in the computer syste
APA, Harvard, Vancouver, ISO, and other styles
3

Pentukar, Sai Kiran. "OCLEP+: One-Class Intrusion Detection Using Length of Patterns." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1496147438710588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.

Full text
Abstract:
Network traffic exhibits a high level of variability over short periods of time. This variability impacts negatively on the performance (accuracy) of anomaly-based network Intrusion Detection Systems (IDS) that are built using predictive models in a batch-learning setup. This thesis investigates how adapting the discriminating threshold of model predictions, specifically to the evaluated traffic, improves the detection rates of these Intrusion Detection models. Specifically, this thesis studied the adaptability features of three well known Machine Learning algorithms: C5.0, Random Forest, and
APA, Harvard, Vancouver, ISO, and other styles
5

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Full text
Abstract:
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theo
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Jung Won. "Integrating artificial immune algorithms for intrusion detection." Thesis, University College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Webster, Seth E. (Seth Emerson) 1975. "The development and analysis of intrusion detection algorithms." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kannan, Anand. "Performance evaluation of security mechanisms in Cloud Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99464.

Full text
Abstract:
Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models thereby completing the cloud computing picture by addressing the networking aspects. In cloud networking, shared network resourc
APA, Harvard, Vancouver, ISO, and other styles
9

Ozbey, Halil. "A Genetic-based Intelligent Intrusion Detection System." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606636/index.pdf.

Full text
Abstract:
In this study we address the problem of detecting new types of intrusions to computer systems which cannot be handled by widely implemented knowledge-based mechanisms. The solutions offered by behavior-based prototypes either suffer low accuracy and low completeness or require use data eplaining abnormal behavior which actually is not available. Our aim is to develop an algorithm which can produce a satisfactory model of the target system&rsquo<br>s behavior in the absence of negative data. First, we design and develop an intelligent and behavior-based detection mechanism using genetic-based m
APA, Harvard, Vancouver, ISO, and other styles
10

Wan, Tao. "IntruDetector, a software platform for testing network intrusion detection algorithms." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ60258.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Botes, Frans Hendrik. "Ant tree miner amyntas for intrusion detection." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2865.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.<br>With the constant evolution of information systems, companies have to acclimatise to the vast increase of data flowing through their networks. Business processes rely heavily on information technology and operate within a framework of little to no space for interruptions. Cyber attacks aimed at interrupting business operations, false intrusion detections and leaked information burden companies with large monetary and reputational costs. Intrusion detection systems analyse network traffic to identify susp
APA, Harvard, Vancouver, ISO, and other styles
12

Abas, Ashardi B. "Non-intrusive driver drowsiness detection system." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5521.

Full text
Abstract:
The development of technologies for preventing drowsiness at the wheel is a major challenge in the field of accident avoidance systems. Preventing drowsiness during driving requires a method for accurately detecting a decline in driver alertness and a method for alerting and refreshing the driver. As a detection method, the authors have developed a system that uses image processing technology to analyse images of the road lane with a video camera integrated with steering wheel angle data collection from a car simulation system. The main contribution of this study is a novel algorithm for drows
APA, Harvard, Vancouver, ISO, and other styles
13

Rastegari, Samaneh. "Intelligent network intrusion detection using an evolutionary computation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1760.

Full text
Abstract:
With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems. Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attac
APA, Harvard, Vancouver, ISO, and other styles
14

Kopek, Christopher Vincent. "Parallel intrusion detection systems for high speed networks using the divided data parallel method." Electronic thesis, 2007. http://dspace.zsr.wfu.edu/jspui/handle/10339/191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Al, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Petersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.

Full text
Abstract:
Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. The compared classification learning algorithms in this thesis are: C4.5, CART, k-NN and Naïve Bayes. The performance of t
APA, Harvard, Vancouver, ISO, and other styles
17

Yu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.

Full text
Abstract:
Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for real-world deployment. Straightforward mappings of cybersecurity applications onto HPC platforms may significantly underutilize the HPC devices' capacities. On the other hand, the sophisticated implementations are quite difficult: they require both in-depth understandings of cybersecurity domain-specific characteristics and HPC architecture and system model. In our work, we investigate three sub-areas in cybersecurity, including m
APA, Harvard, Vancouver, ISO, and other styles
18

Moured, David Paul. "Dynamic Game-Theoretic Models to Determine the Value of Intrusion Detection Systems in the Face of Uncertainty." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/26.

Full text
Abstract:
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growing exponentially. The threat to monetary and intellectual property has made Information Technology (IT) security management a critical challenge to firms. Security devices, including Intrusion Detections Systems (IDS), are commonly used to help protect these firms from malicious users by identifying the presence of malicious network traffic. However, the actual value of these devices remains uncertain among the IT security community because of the costs associated with the implementation of diffe
APA, Harvard, Vancouver, ISO, and other styles
19

Hyla, Bret M. "Sample Entropy and Random Forests a methodology for anomaly-based intrusion detection and classification of low-bandwidth malware attacks /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHyla.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Craig Martell, Kevin Squire. "September 2006." Includes bibliographical references (p.59-62). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Della, Chiesa Enrico. "Implementazione Tensorflow di Algoritmi di Anomaly Detection per la Rilevazione di Intrusioni Mediante Signals of Opportunity (SoOP)." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
In questo elaborato viene presentata l’implementazione di algoritmi di machine learning di tipo supervised e unsupervised attraverso Python e Tensorflow. In particolare viene affrontato come caso di studio l’implementazione di algoritmi di Anomaly Detection. Nel Capitolo 1 vengono presentati gli algoritmi di machine learning implementati. Nel Capitolo 2 viene presentato e analizzato l’ambiente di sviluppo utilizzato, costituito da Python e Tensoflow. Infine è presentata l’implementazione degli algoritmi descritti al capitolo 1. Nel Capitolo 3 sono implementati come caso di studio due algoritm
APA, Harvard, Vancouver, ISO, and other styles
21

Stanek, Timotej. "Automatické shlukování regulárních výrazů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235531.

Full text
Abstract:
This project is about security of computer networks using Intrusion Detection Systems. IDS contain rules for detection expressed with regular expressions, which are for detection represented by finite-state automata. The complexity of this detection with non-deterministic and deterministic finite-state automata is explained. This complexity can be reduced with help of regular expressions grouping. Grouping algorithm and approaches for speedup and improvement are introduced. One of the approches is Genetic algorithm, which can work real-time. Finally Random search algorithm for grouping of regu
APA, Harvard, Vancouver, ISO, and other styles
22

Khasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Andersson, Robin. "Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.

Full text
Abstract:
With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models ve
APA, Harvard, Vancouver, ISO, and other styles
24

Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.

Full text
Abstract:
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Chung-Hung, and 陳忠鴻. "New Pattern Search Algorithm for Intrusion Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/22117646859803730483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Tze-Hung, and 陳則宏. "A Hybrid Classification Algorithm for Intrusion Detection System." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394050%22.&searchmode=basic.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>107<br>The research of intrusion detection system (IDS) is mature. With the progress of science and technology, IDS needed to detect a general network of attack and novel attack on the device of IoT. Because cyber-attacks are getting more complicated, it must only need to rely on complex algorithms to accurately classify and not the traditional algorithm. Recent research will combine many algorithms to improve the performance of the intrusion detection system to detect cyber-attacks, like metaheuristic algorithm, clustering algorithm, classification algorithm, and
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Hou-Lung, and 林厚龍. "A Load Balancing Algorithm for Distributed Intrusion Detection Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/30771484338806241223.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>資訊工程學系<br>95<br>Internet is used frequently in the modern world and it has become a crucial communication method for people. To protect the computers not to be hacked and intruded from the internet, Intrusion Detection Systems (IDSs) have become very important in the computer safety issue. How to enhance the efficiency and credibility of IDSs is a very important issue. The main part of my thesis is a load balancing algorithm for distributed IDSs. It is mostly based on the splitter and IDS sensors. Along with IDSs which are based on the change of variety of Internet to define
APA, Harvard, Vancouver, ISO, and other styles
28

Kuang, Liwei. "DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm." Thesis, 2007. http://hdl.handle.net/1974/671.

Full text
Abstract:
The dependability of an Intrusion Detection System (IDS) relies on two factors: ability to detect intrusions and survivability in hostile environments. Machine learning-based anomaly detection approaches are gaining increasing attention in the network intrusion detection community because of their intrinsic ability to discover novel attacks. This ability has become critical since the number of new attacks has kept growing in recent years. However, most of today’s anomaly-based IDSs generate high false positive rates and miss many attacks because of a deficiency in their ability to discriminate
APA, Harvard, Vancouver, ISO, and other styles
29

Tseng, Hung-Lin, and 曾鴻麟. "An Ensemble Based Classification Algorithm for Network Intrusion Detection System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/16771777095571370354.

Full text
Abstract:
碩士<br>國防大學理工學院<br>資訊科學碩士班<br>99<br>In the environment of changing information security threats, an intrusion detection system (IDS) is an important line of defense. With the continuous progress of information technology, the network speed and throughput are also increasing. There are hundreds of thousands of packets per second in the network. Taking both information security and network quality into account are a very important issue. In recent years, data mining technology becomes very popular and is applied in various fields successfully. Data mining can discover the useful information from
APA, Harvard, Vancouver, ISO, and other styles
30

Hsu, Kai-Shuo, and 許凱碩. "Investigation and Simulation of an OTDR-based Perimeter Intrusion Detection System and Its Intrusion Locating Algorithm." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/pvpj8g.

Full text
Abstract:
碩士<br>國立清華大學<br>電機工程學系所<br>106<br>The fiber perimeter intrusion detection system based on the optical time domain reflectometer (OTDR) mainly uses the backscattering phenomenon in the light wave to analyze and locate the intrusion position. To analyze the signal of this fiber OTDR perimeter intrusion detection system, theoretical backscattered signal model of delta function approximated scatterers in [31] is studied. A Matlab program is developed to simulate backscattered OTDR light intensity signal under various intrusion disturbance and detector noise scenarios. The differential method and m
APA, Harvard, Vancouver, ISO, and other styles
31

Geta, Gemechu. "A HYBRID FUZZY/GENETIC ALGORITHM FOR INTRUSION DETECTION IN RFID SYSTEMS." 2011. http://hdl.handle.net/10222/14416.

Full text
Abstract:
Various established and emerging applications of RFID technology have been and are being implemented by companies in different parts of the world. However, RFID technology is susceptible to a variety of security and privacy concerns, as it is prone to attacks such as eavesdropping, denial of service, tag cloning and user tracking. This is mainly because RFID tags, specifically low-cost tags, have low computational capability to support complex cryptographic algorithms. Tag cloning is a key problem to be considered since it leads to severe economic losses. One of the possible approaches to addr
APA, Harvard, Vancouver, ISO, and other styles
32

Hsu, Ying-Che, and 徐英哲. "An Adaptive Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/xw7767.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>93<br>This thesis is mainly connected with Distribution Intrusion Detection System – NDIDS, and how to make each CPU Loading of Snort Clients or Snort sensors reach balance. Besides, this thesis is about two adaptive rule assignment algorithms. One is the increased and deleted principle of the Snort sensor rule. Another is the selected principle of the increased and deleted rule. Furthermore, there is synthetic discussing the differences and suitable time between each algorithm. Finally, this thesis aims at the effect differences and experiment results of the environme
APA, Harvard, Vancouver, ISO, and other styles
33

Tseng, Jen-Chih, and 曾仁志. "A Static Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28811918020972188152.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>93<br>In this paper, we propose a method to analyze the rule of intrusion. When having the intrusion, each snort sensor detect the intrusion according to its rules and can balance cpu loading between snort sensor. And we use the snort-verion 2.2.0. Snort has almost three thousand rules about intrusion signature. As many rules, and we how to pick rules to each snort sensor. According to the order of snort against packets, and sort with this order, then dispatch rules to snort sensor equally. Of course, each sensor’s ability is different, may cause some sensor are overlo
APA, Harvard, Vancouver, ISO, and other styles
34

Hung, Ching-You, and 洪精佑. "A Function-Parallelism Pattern-Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09791445668449235501.

Full text
Abstract:
碩士<br>國立交通大學<br>電機與控制工程系所<br>97<br>Pattern-matching algorithms are the core of network intrusion detection systems (NIDS). The performance of a good pattern-matching algorithm hence dominates the processing time required for deep packet inspections. In this research, we discuss the factors that can affect the performance of a pattern-matching algorithm. Such factors include prefixes of rules and lengths of the longest rules in a ruleset. Previous work to improve the performance of matching patterns (Wu-Manber's and Aho-Corasick's algorithms) adopt either a hash table or finite automaton to sto
APA, Harvard, Vancouver, ISO, and other styles
35

Yang, Jing Yao, and 楊景堯. "Using GPU to Improve Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/54300985659005835704.

Full text
Abstract:
碩士<br>長庚大學<br>資訊工程學系<br>102<br>In order to protect networks from attacks, Network Intrusion Detection Systems (NIDS) have been widely utilized. These devices monitor packets in the network and scan packet payloads to detect malicious intrusions according to the predefined rules called patterns or signatures. However, NIDS requires a significant amount of time to check each packet to identify malicious patterns contained in the packets. With the advent of high-speed Internet era, it is a challenging work to design an NIDS which can operates at line speeds of 10 Gbps or beyond. Some studies
APA, Harvard, Vancouver, ISO, and other styles
36

YU, CHANG-CHING, and 游錦昌. "Design and Implementation of Highly Accurate Hierarchical Clustering Algorithm for Intrusion Detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/63918180499345437958.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理學系碩士班<br>93<br>With the growth of Internet, the number of hackers is increasing. Therefore, how to protect information security and avoid intrusions is an important issue. In order to prevent the behavior of intrusion to Internet, many software tools or methods such as intrusion detection systems have been proposing. However, in the past twenty years, the operation of intrusion detection systems still cannot be efficient. The reason is that existing intrusion detection systems are still with low detection rate and high false positive. Especially, high false positive lets syst
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Yu-Shu, and 陳毓書. "Combining Incremental Hidden Markov Model and Adaboost Algorithm for Anomaly Intrusion Detection." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/38799778297148881388.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊管理研究所<br>97<br>Due to global malwares and intrusions grow sharply; hence it’s important to develop effective Intrusion Detection Systems (IDSs) to promote the accurate rate of intrusion detection. IDSs determine whether the current system is incurred intrusion by analyzing system call sequences, system logs or network packets. All of these data include the time series events. Traditional Hidden Markov Model (HMM), which has the great capability to describe the time series data, has been successfully applied to anomaly intrusion detection to model a normal profile. Incremental
APA, Harvard, Vancouver, ISO, and other styles
38

Chiu, Chi-Chang, and 邱啟彰. "Design a Two-Way Fast String-Matching Algorithm for Intrusion Detection System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/86518049918252358632.

Full text
Abstract:
碩士<br>義守大學<br>資訊工程學系碩士班<br>96<br>As proliferation of Internet applications increases, security becomes a serious problem within network solutions. Intrusion detection systems (IDS) have become widely recognized as the most effective ways for identifying and thwarting all kinds of known network attacks. Because most of the known attacks can be represented with strings or combinations of multiple substrings, string matching is one of the most critical components in IDS. String matching must check every byte of every packet to see if it matches one of a set of ten thousand suspicious strings. As
APA, Harvard, Vancouver, ISO, and other styles
39

陳建麟. "A Parallel String Matching Algorithm for High Speed Network Intrusion Detection System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/57773162720790226759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Jhao Han, and 陳昭翰. "An Effective Pattern Matching Algorithm for Network Intrusion Detection Using Network Processors." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36725737784923767693.

Full text
Abstract:
碩士<br>長庚大學<br>資訊工程學系<br>99<br>In order to protect networks from attacks, Network Intrusion Detection Systems (NIDS) have been widely deployed. These devices monitor packets in the network and scan packet payloads to detect malicious intrusions according to the predefined rules called patterns or signatures. It is time consuming for NIDS to check each packet to see if it contains any malicious patterns. Studies reveal that about 31% of the processing time in NIDS is spent on pattern matching. Since software-based NIDS suffer from speed limitation, hardware-based NIDS appear to a good choice for
APA, Harvard, Vancouver, ISO, and other styles
41

Subramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1384.

Full text
Abstract:
This thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they are expensive in terms of energy. But, as intrusion being a rare event and cannot be missed, local computations expend more energy than data transmission. Hence, the need for a low-complexity algorithm for intrusion detection is inevitable. A low-complexity algorithm for intrusion detection in the
APA, Harvard, Vancouver, ISO, and other styles
42

Subramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1384.

Full text
Abstract:
This thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they are expensive in terms of energy. But, as intrusion being a rare event and cannot be missed, local computations expend more energy than data transmission. Hence, the need for a low-complexity algorithm for intrusion detection is inevitable. A low-complexity algorithm for intrusion detection in the p
APA, Harvard, Vancouver, ISO, and other styles
43

Chien, Sheng-Wei, and 簡聖瑋. "Using Genetic Algorithm to Improve Network Intrusion Detection System Based on Incremental Mining." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72660456867463518111.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊工程學系碩士班<br>98<br>Data mining is commonly used in attempts to induce association rules from transaction data. Most previous studies focused on mining from binary valued data. Transactions in real-world applications, however, usually consist of quantitative values. At the same time, Internet Seceurity is more and more important. In the Network Intrusion Detection System, we already had one which based on incremental mining with fuzzy association rules. This thesis thus proposes Genetic Algorithm to get the best membership functions for each feature from NIDS. In the method, the s
APA, Harvard, Vancouver, ISO, and other styles
44

Sajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1282.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a dense network of autonomous devices (or motes) with sensors that cooperatively monitor some physical or environmental conditions. These devices are resource constrained -limited memory, power and computational resources. Thus, any algorithm developed for WSN should be deigned such that the algorithm consumes the resources as minimal as possible. The problem addressed in this thesis is developing a low-complexity algorithm for intrusion detection in the presence of clutter arising from moving vegetation, using Passive Infra-Red (PIR) sensors. The algorithm i
APA, Harvard, Vancouver, ISO, and other styles
45

Sajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1282.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a dense network of autonomous devices (or motes) with sensors that cooperatively monitor some physical or environmental conditions. These devices are resource constrained -limited memory, power and computational resources. Thus, any algorithm developed for WSN should be deigned such that the algorithm consumes the resources as minimal as possible. The problem addressed in this thesis is developing a low-complexity algorithm for intrusion detection in the presence of clutter arising from moving vegetation, using Passive Infra-Red (PIR) sensors. The algorithm i
APA, Harvard, Vancouver, ISO, and other styles
46

Stewart, IAN. "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection." Thesis, 2009. http://hdl.handle.net/1974/1720.

Full text
Abstract:
As our reliance on the Internet continues to grow, the need for secure, reliable networks also increases. Using a modified genetic algorithm and a switch-based neural network model, this thesis outlines the creation of a powerful intrusion detection system (IDS) capable of detecting network attacks. The new genetic algorithm is tested against traditional and other modified genetic algorithms using common benchmark functions, and is found to produce better results in less time, and with less human interaction. The IDS is tested using the standard benchmark data collection for intrusion det
APA, Harvard, Vancouver, ISO, and other styles
47

Ko, Wan-Pao, and 柯萬保. "Using Support Vector Machine and Genetic Algorithm to Reduce Asymmetric Cost in Intrusion Detection System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90052706830973803219.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊管理研究所<br>94<br>Owing to the development of Internet, system security problems and intrusion of hacker happened frequently. People begin to notice the importance of Internet information security gradually. Besides, intrusion detection system has also become main research field. In the past, most literature only focused on improving the accuracy of predicting intrusion detection. However, in practice, because of the hugeness and continuous growing of network packet, traditional rule bases and feature matching skills still couldn’t decrease the error rate. What’s more, managers
APA, Harvard, Vancouver, ISO, and other styles
48

Chang, Yu-Cheng, and 張育政. "A hybrid approach of rough set theory and genetic algorithm for SVM-based intrusion detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86699518854455525991.

Full text
Abstract:
碩士<br>中華大學<br>資訊管理學系<br>93<br>The key point of intrusion detection system is the detection efficiency. In this paper, we propose a hybrid approach of rough set theory and genetic algorithm for SVM-based intrusion detection. Discretizing values of quantitative attributes and attribute selection are important in rough set theory. This study develops a genetic algorithm system based on the rough set theory for simultaneously discretizing continuous valued attributes and selecting attributes to compute minimal reduct. Then, the reduct is used for intrusion detection classification by support vecto
APA, Harvard, Vancouver, ISO, and other styles
49

Cheng-FengKe and 柯埕峰. "Accelerating Aho-Corasick Algorithm using Odd-Even Sub Pattern to improve Snort Intrusion Detection System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/487b46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

(6636224), Seunghee Lee. "Incremental Support Vector Machine Approach for DoS and DDoS Attack Detection." Thesis, 2019.

Find full text
Abstract:
<div> <div> <div> <p>Support Vector Machines (SVMs) have generally been effective in detecting instances of network intrusion. However, from a practical point of view, a standard SVM is not able to handle large-scale data efficiently due to the computation complexity of the algorithm and extensive memory requirements. To cope with the limitation, this study presents an incremental SVM method combined with a k-nearest neighbors (KNN) based candidate support vectors (CSV) selection strategy in order to speed up training and test process. The proposed incremental SVM method constructs or updates
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!