Dissertations / Theses on the topic 'Intrusion Detection Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Intrusion Detection Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Janagam, Anirudh, and Saddam Hossen. "Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm)." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17126.
Full textPillay, Manju Mohan. "Applying genetic algorithm techniques in network intrusion detection systems / Pillai, M.M." Thesis, North-West University, 2011. http://hdl.handle.net/10394/7030.
Full textThesis (M.Ing. (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2012.
Pentukar, Sai Kiran. "OCLEP+: One-Class Intrusion Detection Using Length of Patterns." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1496147438710588.
Full textAl, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.
Full textThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textKim, Jung Won. "Integrating artificial immune algorithms for intrusion detection." Thesis, University College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398425.
Full textWebster, Seth E. (Seth Emerson) 1975. "The development and analysis of intrusion detection algorithms." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50439.
Full textKannan, Anand. "Performance evaluation of security mechanisms in Cloud Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99464.
Full textInfrastructure as a Service (IaaS) är en Cloudtjänstmodell som huvudsakligen är inriktat på att tillhandahålla ett datacenter för behandling och lagring av data. Nätverksaspekterna av en cloudbaserad infrastruktur som en tjänst utanför datacentret utgör en begränsande faktor som förhindrar känsliga kommunikationstjänster från att anamma denna teknik. Cloudnätverk är en ny teknik som integrerar nätverkstillgång med befintliga cloudtjänstmodeller och därmed fullbordar föreställningen av cloud data genom att ta itu med nätverkaspekten. I cloudnätverk virtualiseras delade nätverksresurser, de avsätts till kunder och slutanvändare vid efterfrågan på ett flexibelt sätt. Denna teknik tillåter olika typer av möjligheter, t.ex. att minska latens och belastningen på nätet. Vidare ger detta tjänsteleverantörer ett sätt att tillhandahålla garantier för nätverksprestandan som en del av deras tjänsteutbud. Men denna nya strategi introducerar nya säkerhetsutmaningar, exempelvis VM migration genom offentligt nätverk. Många av dessa säkerhetsutmaningar behandlas i CloNe’s Security Architecture. Denna rapport presenterar en rad av potentiella tekniker för att säkra olika resurser i en cloudbaserad nätverksmiljö som inte behandlas i den redan existerande CloNe Security Architecture. Rapporten inleds med en helhetssyn på cloudbaserad nätverk som beskrivs i Scalable and Adaptive Internet Solutions (SAIL)-projektet, tillsammans med dess föreslagna arkitektur och säkerhetsmål. Detta följs av en översikt över de problem som måste lösas och några av de olika metoder som kan tillämpas för att lösa delar av det övergripande problemet. Speciellt behandlas en omfattande och tätt integrerad multi-säkerhetsarkitektur, en nyckelhanteringsalgoritm som stödjer mekanismens åtkomstkontroll och en mekanism för intrångsdetektering. För varje metod eller för varje uppsättning av metoder, presenteras ståndpunkten för respektive teknik. Dessutom har experimenten för att förstå prestandan av dessa mekanismer utvärderats på testbädd av ett enkelt cloudnätverk. Den föreslagna nyckelhantering system använder en hierarkisk nyckelhantering strategi som ger snabb och säker viktig uppdatering när medlemmar ansluta sig till och medlemmarna lämnar utförs. Försöksresultat visar att den föreslagna nyckelhantering system ökar säkerheten och ökar tillgänglighet och integritet. En nyligen föreslagna genetisk algoritm baserad funktion valet teknik har använts för effektiv funktion val. Fuzzy SVM har använts på de uppgifter som för effektiv klassificering. Försök har visat att den föreslagna genetiska baserad funktion selekteringsalgoritmen minskar antalet funktioner och därmed minskar klassificering tiden, och samtidigt förbättra upptäckt noggrannhet fuzzy SVM klassificeraren genom att minimera de motstående regler som kan förvirra klassificeraren. De främsta fördelarna med detta intrångsdetekteringssystem är den minskning av falska positiva och ökad säkerhet.
Ozbey, Halil. "A Genetic-based Intelligent Intrusion Detection System." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606636/index.pdf.
Full texts behavior in the absence of negative data. First, we design and develop an intelligent and behavior-based detection mechanism using genetic-based machine learning techniques with subsidies in the Bucket Brigade Algorithm. It classifies the possible system states to be normal and abnormal and interprets the abnormal state observations as evidences for the presence of an intrusion. Next we provide another algorithm which focuses on capturing normal behavior of the target system to detect intrusions again by identifying anomalies. A compact and highly complete rule set is generated by continuously inserting observed states as rules into the rule set and combining similar rule pairs in each step. Experiments conducted using the KDD-99 data set have produced fairly good results for both of the algorihtms.
Wan, Tao. "IntruDetector, a software platform for testing network intrusion detection algorithms." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ60258.pdf.
Full textBotes, Frans Hendrik. "Ant tree miner amyntas for intrusion detection." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2865.
Full textWith the constant evolution of information systems, companies have to acclimatise to the vast increase of data flowing through their networks. Business processes rely heavily on information technology and operate within a framework of little to no space for interruptions. Cyber attacks aimed at interrupting business operations, false intrusion detections and leaked information burden companies with large monetary and reputational costs. Intrusion detection systems analyse network traffic to identify suspicious patterns that intent to compromise the system. Classifiers (algorithms) are used to classify the data within different categories e.g. malicious or normal network traffic. Recent surveys within intrusion detection highlight the need for improved detection techniques and warrant further experimentation for improvement. This experimental research project focuses on implementing swarm intelligence techniques within the intrusion detection domain. The Ant Tree Miner algorithm induces decision trees by using ant colony optimisation techniques. The Ant Tree Miner poses high accuracy with efficient results. However, limited research has been performed on this classifier in other domains such as intrusion detection. The research provides the intrusion detection domain with a new algorithm that improves upon results of decision trees and ant colony optimisation techniques when applied to the domain. The research has led to valuable insights into the Ant Tree Miner classifier within a previously unknown domain and created an intrusion detection benchmark for future researchers.
Abas, Ashardi B. "Non-intrusive driver drowsiness detection system." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5521.
Full textRastegari, Samaneh. "Intelligent network intrusion detection using an evolutionary computation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1760.
Full textKopek, Christopher Vincent. "Parallel intrusion detection systems for high speed networks using the divided data parallel method." Electronic thesis, 2007. http://dspace.zsr.wfu.edu/jspui/handle/10339/191.
Full textAl, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.
Full textPetersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textYu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Full textDoctor of Philosophy
Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for the real-world deployment. Straightforward mappings of applications onto High-Performance Computing (HPC) platforms may significantly underutilize the HPC devices’ capacities. In this dissertation, we demonstrate how application-specific characteristics can be leveraged to optimize various types of HPC executions for cybersecurity. We investigate several sub-areas, including mobile software security, network security, and system security. For example, we present a new GPU-assisted framework and a collection of optimization strategies for fast Android static data-flow analysis that achieve up to 128X speedups against the unoptimized GPU implementation. For network intrusion detection systems (IDS), we design and implement an algorithm capable of eliminating the state explosion in out-of-order packet situations, which reduces up to 400X of the memory overhead. We also present tools for improving the usability of HPC programming. To study the cache configurations’ impact on time-driven cache side-channel attacks’ performance, we design an approach to conducting comparative measurement. We propose a quantifiable success rate metric to measure the performance of time-driven cache attacks and utilize the GEM5 platform to emulate the configurable cache.
Moured, David Paul. "Dynamic Game-Theoretic Models to Determine the Value of Intrusion Detection Systems in the Face of Uncertainty." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/26.
Full textHyla, Bret M. "Sample Entropy and Random Forests a methodology for anomaly-based intrusion detection and classification of low-bandwidth malware attacks /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHyla.pdf.
Full textThesis Advisor(s): Craig Martell, Kevin Squire. "September 2006." Includes bibliographical references (p.59-62). Also available in print.
Della, Chiesa Enrico. "Implementazione Tensorflow di Algoritmi di Anomaly Detection per la Rilevazione di Intrusioni Mediante Signals of Opportunity (SoOP)." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Stanek, Timotej. "Automatické shlukování regulárních výrazů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235531.
Full textKhasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.
Full textAndersson, Robin. "Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.
Full textAlkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Full textChen, Chung-Hung, and 陳忠鴻. "New Pattern Search Algorithm for Intrusion Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/22117646859803730483.
Full textChen, Tze-Hung, and 陳則宏. "A Hybrid Classification Algorithm for Intrusion Detection System." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394050%22.&searchmode=basic.
Full text國立中興大學
資訊科學與工程學系所
107
The research of intrusion detection system (IDS) is mature. With the progress of science and technology, IDS needed to detect a general network of attack and novel attack on the device of IoT. Because cyber-attacks are getting more complicated, it must only need to rely on complex algorithms to accurately classify and not the traditional algorithm. Recent research will combine many algorithms to improve the performance of the intrusion detection system to detect cyber-attacks, like metaheuristic algorithm, clustering algorithm, classification algorithm, and other algorithms. In this paper, we will combine to three algorithms applying to the intrusion detection system and use to combine search economics algorithm and k-means algorithm to improve performance of classification for support vector machine. In experimental results, we compare the proposed algorithm with many different machine learning algorithms in terms of recall, false alarm rate, precision, and accuracy. The simulation results show that the proposed algorithm can effectively improve the classification effect of the classification algorithm.
Lin, Hou-Lung, and 林厚龍. "A Load Balancing Algorithm for Distributed Intrusion Detection Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/30771484338806241223.
Full text國立臺灣海洋大學
資訊工程學系
95
Internet is used frequently in the modern world and it has become a crucial communication method for people. To protect the computers not to be hacked and intruded from the internet, Intrusion Detection Systems (IDSs) have become very important in the computer safety issue. How to enhance the efficiency and credibility of IDSs is a very important issue. The main part of my thesis is a load balancing algorithm for distributed IDSs. It is mostly based on the splitter and IDS sensors. Along with IDSs which are based on the change of variety of Internet to define the policy of splitter and distribute rules to the Snort Sensor. Finally all packets will be distributed to IDSs and be checked so IDSs can be evenly loaded and furthermore lowers the load to increase the efficiency and credibility of the Intrusion Detection Systems.
Kuang, Liwei. "DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm." Thesis, 2007. http://hdl.handle.net/1974/671.
Full textThesis (Master, Computing) -- Queen's University, 2007-09-05 14:36:57.128
Tseng, Hung-Lin, and 曾鴻麟. "An Ensemble Based Classification Algorithm for Network Intrusion Detection System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/16771777095571370354.
Full text國防大學理工學院
資訊科學碩士班
99
In the environment of changing information security threats, an intrusion detection system (IDS) is an important line of defense. With the continuous progress of information technology, the network speed and throughput are also increasing. There are hundreds of thousands of packets per second in the network. Taking both information security and network quality into account are a very important issue. In recent years, data mining technology becomes very popular and is applied in various fields successfully. Data mining can discover the useful information from a large volume of data. The current research tends to apply data mining technology in constructing the IDSs. However, many challenges still exist to be overcomed in the field of data mining-based IDSs, such as the imbalanced data sets, poor detection rate of the minority class, and low accuracy rate, etc. Therefore, by integrating the data selection, sampling, and feature selection methods, this thesis proposes an “Enhanced Integrated Learning” algorithm and an “EIL-Algorithm Based Ensemble System” to strengthen the classification model and its performance. This thesis uses KDD99 data set as the experiment data source. A series of experiments are conducted to show that the proposed algorithms can enhance the classification performance of the minority class. For U2R attack class, Recall and F-measure are 57.01% and 38.98%, respectively, which shows the classification performance for U2R attack class is effectively improved. Meanwhile, the overall classification performance of anomaly network-based IDS is enhanced.
Hsu, Kai-Shuo, and 許凱碩. "Investigation and Simulation of an OTDR-based Perimeter Intrusion Detection System and Its Intrusion Locating Algorithm." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/pvpj8g.
Full text國立清華大學
電機工程學系所
106
The fiber perimeter intrusion detection system based on the optical time domain reflectometer (OTDR) mainly uses the backscattering phenomenon in the light wave to analyze and locate the intrusion position. To analyze the signal of this fiber OTDR perimeter intrusion detection system, theoretical backscattered signal model of delta function approximated scatterers in [31] is studied. A Matlab program is developed to simulate backscattered OTDR light intensity signal under various intrusion disturbance and detector noise scenarios. The differential method and moving differential method are applied to the simulation signals to determine the intrusion location. Location errors of the two algorithms under various noise levels are compared and discussed. It is found that the moving differential method can locate the intrusion point from the signal accurately. An 8.8 km fiber OTDR prototype system is built in Professor Likarn Wang’s Lab. Real OTDR signals under various disturbances controlled by PZT at 0.5 km, 4.4 km, 4.9 km and 8.8 km are recorded. They are processed by moving differential method to determine the intrusion location. In addition to the moving differential method, the wavelet-lowpass differential method and sum of magnitude spectrum method are proposed to estimate the intrusion location. By comparing the location errors, it is found that the wavelet-lowpass differential method performed better than the other two methods in intrusion at 4.4 km, 4.9 km and 8.8 km cases.
Geta, Gemechu. "A HYBRID FUZZY/GENETIC ALGORITHM FOR INTRUSION DETECTION IN RFID SYSTEMS." 2011. http://hdl.handle.net/10222/14416.
Full textHsu, Ying-Che, and 徐英哲. "An Adaptive Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/xw7767.
Full text中原大學
資訊工程研究所
93
This thesis is mainly connected with Distribution Intrusion Detection System – NDIDS, and how to make each CPU Loading of Snort Clients or Snort sensors reach balance. Besides, this thesis is about two adaptive rule assignment algorithms. One is the increased and deleted principle of the Snort sensor rule. Another is the selected principle of the increased and deleted rule. Furthermore, there is synthetic discussing the differences and suitable time between each algorithm. Finally, this thesis aims at the effect differences and experiment results of the environment differences, as CPU, of each Snort sensor in the distribution system, and the effects of the number of Snort sensor in the linear growth. Key words: Distribution Intrusion Detection System – NDIDS, Adaptive rule assignment, Distribution System
Tseng, Jen-Chih, and 曾仁志. "A Static Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28811918020972188152.
Full text中原大學
資訊工程研究所
93
In this paper, we propose a method to analyze the rule of intrusion. When having the intrusion, each snort sensor detect the intrusion according to its rules and can balance cpu loading between snort sensor. And we use the snort-verion 2.2.0. Snort has almost three thousand rules about intrusion signature. As many rules, and we how to pick rules to each snort sensor. According to the order of snort against packets, and sort with this order, then dispatch rules to snort sensor equally. Of course, each sensor’s ability is different, may cause some sensor are overloaded, couldn’t balance between snort sensor. So, give the weight to each rule, the snort sensor with higher ability would be dispatched the heavier rule. On the other hand, snort sensor with lower ability would be dispatched the lighter rule. And we also classify the snort rule according to Snort Rule Header. Snort rules would be dispatched to each snort sensor equally. Finally, we will illustrate how to give the rule weight and the influence about the algorithm.
Hung, Ching-You, and 洪精佑. "A Function-Parallelism Pattern-Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09791445668449235501.
Full text國立交通大學
電機與控制工程系所
97
Pattern-matching algorithms are the core of network intrusion detection systems (NIDS). The performance of a good pattern-matching algorithm hence dominates the processing time required for deep packet inspections. In this research, we discuss the factors that can affect the performance of a pattern-matching algorithm. Such factors include prefixes of rules and lengths of the longest rules in a ruleset. Previous work to improve the performance of matching patterns (Wu-Manber's and Aho-Corasick's algorithms) adopt either a hash table or finite automaton to store the rulesets. None of these algorithms considers the parallelization when running on multicore systems. Herein, we propose a new pattern-matching algorithm for NIDS that can be easily adapted to multi-core systems. Our algorithm is composed of a search mechanism based on the function-parallelism approach and a composite data structure, combining the hash table and finite state machines. We conduct a series of experiments to show that our algorithm is 2.2 times faster than the Aho-Corasick algorithm and 1.21 times than Wu-Manber's in a dual-processor system.
Yang, Jing Yao, and 楊景堯. "Using GPU to Improve Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/54300985659005835704.
Full text長庚大學
資訊工程學系
102
In order to protect networks from attacks, Network Intrusion Detection Systems (NIDS) have been widely utilized. These devices monitor packets in the network and scan packet payloads to detect malicious intrusions according to the predefined rules called patterns or signatures. However, NIDS requires a significant amount of time to check each packet to identify malicious patterns contained in the packets. With the advent of high-speed Internet era, it is a challenging work to design an NIDS which can operates at line speeds of 10 Gbps or beyond. Some studies have tried to solve this problem using multi-queue network interface cards (NICs), multiple central processing units (CPUs), and multiple graphics processing units (GPUs). In this thesis, we first identify the bottleneck of an NIDS that utilizes both CPUs and GPUs. We then purpose a pattern matching algorithm using CPU/GPU cooperation (CGC) to solve the bottleneck. The proposed algorithm efficiently balances the load between the CPUs and GPUs. All incoming packets are first scanned by the CPUs. Only those packets that may contain intrusive patterns will be forwarded to the GPUs for further scanning. The proposed algorithm was implemented and evaluated on Linux. Simulation results show that the proposed algorithm can operate at full line speed of 10 Gbps, which is significantly better than the compared algorithms.
YU, CHANG-CHING, and 游錦昌. "Design and Implementation of Highly Accurate Hierarchical Clustering Algorithm for Intrusion Detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/63918180499345437958.
Full text大葉大學
資訊管理學系碩士班
93
With the growth of Internet, the number of hackers is increasing. Therefore, how to protect information security and avoid intrusions is an important issue. In order to prevent the behavior of intrusion to Internet, many software tools or methods such as intrusion detection systems have been proposing. However, in the past twenty years, the operation of intrusion detection systems still cannot be efficient. The reason is that existing intrusion detection systems are still with low detection rate and high false positive. Especially, high false positive lets system managers refuse to use intrusion detection systems. Therefore, in order to increase the effectiveness of intrusion detection and reduce the false positive, we propose a hierarchical clustering algorithm for intrusion detection. Our proposed method is the highly accurate hierarchical clustering algorithm, which is suitable for clustering network packets. The proposed clustering algorithm can accurately generate normal and abnormal clusters, and is more efficient and accurate than existing clustering methods.
Chen, Yu-Shu, and 陳毓書. "Combining Incremental Hidden Markov Model and Adaboost Algorithm for Anomaly Intrusion Detection." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/38799778297148881388.
Full text國立中央大學
資訊管理研究所
97
Due to global malwares and intrusions grow sharply; hence it’s important to develop effective Intrusion Detection Systems (IDSs) to promote the accurate rate of intrusion detection. IDSs determine whether the current system is incurred intrusion by analyzing system call sequences, system logs or network packets. All of these data include the time series events. Traditional Hidden Markov Model (HMM), which has the great capability to describe the time series data, has been successfully applied to anomaly intrusion detection to model a normal profile. Incremental HMM (IHMM) further improves the training time of the HMM. However, both HMM and IHMM still have the problem of high false positive rate. In this thesis, we propose to combine IHMM and adaboost for anomaly intrusion detection and name it as Adaboost-IHMM. As Adaboost firstly uses many IHMMs to collectively classify samples, then decides the results of samples’ classifications, the Adaboost-IHMM can improve the accurate rate of classifications. Finally, we do experiments by using Stide and Sendmail system call datasets from UNM and Internet Explorer datasets collected by ourselves. Experimental results with Stide datasets show that the proposed method can significantly improve the false positive rate by 70% without decreasing the detection rate. Besides, we also propose a method to adjust the normal profile for avoiding erroneous detection caused by changes of normal behavior. We perform with experiments with realistic datasets extracted from the use of popular browsers. Compared with traditional HMM method, our method can improve the training time by 90% to build a new normal profile.
Chiu, Chi-Chang, and 邱啟彰. "Design a Two-Way Fast String-Matching Algorithm for Intrusion Detection System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/86518049918252358632.
Full text義守大學
資訊工程學系碩士班
96
As proliferation of Internet applications increases, security becomes a serious problem within network solutions. Intrusion detection systems (IDS) have become widely recognized as the most effective ways for identifying and thwarting all kinds of known network attacks. Because most of the known attacks can be represented with strings or combinations of multiple substrings, string matching is one of the most critical components in IDS. String matching must check every byte of every packet to see if it matches one of a set of ten thousand suspicious strings. As a result, string matching has become the bottleneck in IDS as network speeds grow into the tens of gigabits/second. An efficient string matching algorithms are therefore important for identifying these packets at the line rate. In this study, we propose a two-way parallel structure to further improve the performance of the Aho-Corasick-based string matching algorithm. The proposed string matching algorithm will be implemented by modifying the source code of Snort. Our results showed that two-way Aho-Corasick-based string matching algorithm is superior to other algorithms, especially in detecting network packets with large data payload. Besides, multiway parallel structure can be developed based on the concept of this two way parallel structure, and then be expected to apply to a multiple Gbps intrusion detection system.
陳建麟. "A Parallel String Matching Algorithm for High Speed Network Intrusion Detection System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/57773162720790226759.
Full textChen, Jhao Han, and 陳昭翰. "An Effective Pattern Matching Algorithm for Network Intrusion Detection Using Network Processors." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36725737784923767693.
Full text長庚大學
資訊工程學系
99
In order to protect networks from attacks, Network Intrusion Detection Systems (NIDS) have been widely deployed. These devices monitor packets in the network and scan packet payloads to detect malicious intrusions according to the predefined rules called patterns or signatures. It is time consuming for NIDS to check each packet to see if it contains any malicious patterns. Studies reveal that about 31% of the processing time in NIDS is spent on pattern matching. Since software-based NIDS suffer from speed limitation, hardware-based NIDS appear to a good choice for the future Internet. Network processors provide a scalable and flexible solution to implement NIDS. One distinct feature of network processors is that the size of on-chip memory is typical several 10 KB, which is too small to store the required data structures for the existing pattern matching algorithms. Thus, considerable amount of time has to be spent accessing external memory. In this thesis, we propose a pattern matching algorithm that uses scalable two-layer lookup tables to improve the performance in time. The key idea is to build a tiny and adjustable lookup table which can be fully stored in the on-chip memory of network processors, and reduce the probability of accessing the external memory. Since the latency of one on-chip memory access is far smaller than that of one external memory excess, the time required to process a packet payload can be greatly reduced. We use the well-known Snort rule sets to evaluate the proposed algorithm. Compared with the HMA, an efficient pattern matching algorithm designed for network processors, simulation results show that the proposed algorithm can reduce the processing time by 19% to 84%.
Subramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1384.
Full textSubramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1384.
Full textChien, Sheng-Wei, and 簡聖瑋. "Using Genetic Algorithm to Improve Network Intrusion Detection System Based on Incremental Mining." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72660456867463518111.
Full text銘傳大學
資訊工程學系碩士班
98
Data mining is commonly used in attempts to induce association rules from transaction data. Most previous studies focused on mining from binary valued data. Transactions in real-world applications, however, usually consist of quantitative values. At the same time, Internet Seceurity is more and more important. In the Network Intrusion Detection System, we already had one which based on incremental mining with fuzzy association rules. This thesis thus proposes Genetic Algorithm to get the best membership functions for each feature from NIDS. In the method, the set of membership functions for all feature are encoded into a string of real numbers. At last, the experimental results show that the designed fitness functions can avoid the formation of bad kinds of membership functions and can provide important mining results to our NIDS.
Sajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1282.
Full textSajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1282.
Full textStewart, IAN. "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection." Thesis, 2009. http://hdl.handle.net/1974/1720.
Full textThesis (Master, Computing) -- Queen's University, 2009-03-03 13:28:23.787
Ko, Wan-Pao, and 柯萬保. "Using Support Vector Machine and Genetic Algorithm to Reduce Asymmetric Cost in Intrusion Detection System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90052706830973803219.
Full text國立成功大學
資訊管理研究所
94
Owing to the development of Internet, system security problems and intrusion of hacker happened frequently. People begin to notice the importance of Internet information security gradually. Besides, intrusion detection system has also become main research field. In the past, most literature only focused on improving the accuracy of predicting intrusion detection. However, in practice, because of the hugeness and continuous growing of network packet, traditional rule bases and feature matching skills still couldn’t decrease the error rate. What’s more, managers are tired of investigating and tracking error signals, and it caused low efficiency of security equipment and information workers. Seeing that the situation of successful intrusion and wrong rejecting normal packet may lead to different influences, the business has to pay more for False Negative (FN) than False Positive (FP). Therefore, in the study, the intrusion detection dataset of UCI KDD’99 (Knowledge Discovery in Databases Archive) was used to choose meaningful features and representative instances with a view to reducing attribute dimensions. Then, Support Vector Machine (SVM) was applied to perform classification. Finally, use genetic algorithm (GA) by evaluating error cost to adjust SVM parameters with Radial Basis Function (RBF) as the kernel function. By doing so, it could reduce asymmetric error cost of intrusion detection system. The study reached major conclusion that it could effectively reduce the asymmetric error cost of intrusion detection, and meet business’ demand by setting weights.
Chang, Yu-Cheng, and 張育政. "A hybrid approach of rough set theory and genetic algorithm for SVM-based intrusion detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86699518854455525991.
Full text中華大學
資訊管理學系
93
The key point of intrusion detection system is the detection efficiency. In this paper, we propose a hybrid approach of rough set theory and genetic algorithm for SVM-based intrusion detection. Discretizing values of quantitative attributes and attribute selection are important in rough set theory. This study develops a genetic algorithm system based on the rough set theory for simultaneously discretizing continuous valued attributes and selecting attributes to compute minimal reduct. Then, the reduct is used for intrusion detection classification by support vector machine. The feature reduction approach can also reduce data dimension and complexity. Our experiment result shows that using the minimal reduct that constructed by rough set theory and genetic algorithm can get better performance.
Cheng-FengKe and 柯埕峰. "Accelerating Aho-Corasick Algorithm using Odd-Even Sub Pattern to improve Snort Intrusion Detection System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/487b46.
Full text(6636224), Seunghee Lee. "Incremental Support Vector Machine Approach for DoS and DDoS Attack Detection." Thesis, 2019.
Support Vector Machines (SVMs) have generally been effective in detecting instances of network intrusion. However, from a practical point of view, a standard SVM is not able to handle large-scale data efficiently due to the computation complexity of the algorithm and extensive memory requirements. To cope with the limitation, this study presents an incremental SVM method combined with a k-nearest neighbors (KNN) based candidate support vectors (CSV) selection strategy in order to speed up training and test process. The proposed incremental SVM method constructs or updates the pattern classes by incrementally incorporating new signatures without having to load and access the entire previous dataset in order to cope with evolving DoS and DDoS attacks. Performance of the proposed method is evaluated with experiments and compared with the standard SVM method and the simple incremental SVM method in terms of precision, recall, F1-score, and training and test duration.