Data Mining For Network Intrusion Detection
碩士 === 銘傳大學 === 資訊管理學系碩士班 === 93 === According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely. The huge and variable information of network couldn’t be determined by huma...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/a98a4f |
id |
ndltd-TW-093MCU05396027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093MCU053960272018-04-14T04:22:45Z http://ndltd.ncl.edu.tw/handle/a98a4f Data Mining For Network Intrusion Detection 資料探勘在網路入侵偵測上之研究 Li-Yu Ma 馬莉芋 碩士 銘傳大學 資訊管理學系碩士班 93 According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely. The huge and variable information of network couldn’t be determined by human. And the hacker always can find new way of attack. How could we find this connect is attack or not? And stop it before being attacked. We use DARPA data set and data mining technology training kind of attack model. In the testing data set head, it includes new attack behaviors which never appear in the training data set to ensure our network intrusion model effective making information systems of corporation safely. Yue-Shi Lee 作者未提供 李御壐 朱美珍 2005 學位論文 ; thesis 56 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 銘傳大學 === 資訊管理學系碩士班 === 93 === According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely.
The huge and variable information of network couldn’t be determined by human. And the hacker always can find new way of attack. How could we find this connect is attack or not? And stop it before being attacked. We use DARPA data set and data mining technology training kind of attack model. In the testing data set head, it includes new attack behaviors which never appear in the training data set to ensure our network intrusion model effective making information systems of corporation safely.
|
author2 |
Yue-Shi Lee |
author_facet |
Yue-Shi Lee Li-Yu Ma 馬莉芋 |
author |
Li-Yu Ma 馬莉芋 |
spellingShingle |
Li-Yu Ma 馬莉芋 Data Mining For Network Intrusion Detection |
author_sort |
Li-Yu Ma |
title |
Data Mining For Network Intrusion Detection |
title_short |
Data Mining For Network Intrusion Detection |
title_full |
Data Mining For Network Intrusion Detection |
title_fullStr |
Data Mining For Network Intrusion Detection |
title_full_unstemmed |
Data Mining For Network Intrusion Detection |
title_sort |
data mining for network intrusion detection |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/a98a4f |
work_keys_str_mv |
AT liyuma dataminingfornetworkintrusiondetection AT mǎlìyù dataminingfornetworkintrusiondetection AT liyuma zīliàotànkānzàiwǎnglùrùqīnzhēncèshàngzhīyánjiū AT mǎlìyù zīliàotànkānzàiwǎnglùrùqīnzhēncèshàngzhīyánjiū |
_version_ |
1718631437991673856 |