Data Mining For Network Intrusion Detection

碩士 === 銘傳大學 === 資訊管理學系碩士班 === 93 === According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely. The huge and variable information of network couldn’t be determined by huma...

Full description

Bibliographic Details
Main Authors: Li-Yu Ma, 馬莉芋
Other Authors: Yue-Shi Lee
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/a98a4f
id ndltd-TW-093MCU05396027
record_format oai_dc
spelling ndltd-TW-093MCU053960272018-04-14T04:22:45Z http://ndltd.ncl.edu.tw/handle/a98a4f Data Mining For Network Intrusion Detection 資料探勘在網路入侵偵測上之研究 Li-Yu Ma 馬莉芋 碩士 銘傳大學 資訊管理學系碩士班 93 According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely. The huge and variable information of network couldn’t be determined by human. And the hacker always can find new way of attack. How could we find this connect is attack or not? And stop it before being attacked. We use DARPA data set and data mining technology training kind of attack model. In the testing data set head, it includes new attack behaviors which never appear in the training data set to ensure our network intrusion model effective making information systems of corporation safely. Yue-Shi Lee 作者未提供 李御壐 朱美珍 2005 學位論文 ; thesis 56 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 銘傳大學 === 資訊管理學系碩士班 === 93 === According to survey of CERT, the rate of cyber attacks has been more than doubling every year in recent times. It has become increasingly important to make our information systems safely. The huge and variable information of network couldn’t be determined by human. And the hacker always can find new way of attack. How could we find this connect is attack or not? And stop it before being attacked. We use DARPA data set and data mining technology training kind of attack model. In the testing data set head, it includes new attack behaviors which never appear in the training data set to ensure our network intrusion model effective making information systems of corporation safely.
author2 Yue-Shi Lee
author_facet Yue-Shi Lee
Li-Yu Ma
馬莉芋
author Li-Yu Ma
馬莉芋
spellingShingle Li-Yu Ma
馬莉芋
Data Mining For Network Intrusion Detection
author_sort Li-Yu Ma
title Data Mining For Network Intrusion Detection
title_short Data Mining For Network Intrusion Detection
title_full Data Mining For Network Intrusion Detection
title_fullStr Data Mining For Network Intrusion Detection
title_full_unstemmed Data Mining For Network Intrusion Detection
title_sort data mining for network intrusion detection
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/a98a4f
work_keys_str_mv AT liyuma dataminingfornetworkintrusiondetection
AT mǎlìyù dataminingfornetworkintrusiondetection
AT liyuma zīliàotànkānzàiwǎnglùrùqīnzhēncèshàngzhīyánjiū
AT mǎlìyù zīliàotànkānzàiwǎnglùrùqīnzhēncèshàngzhīyánjiū
_version_ 1718631437991673856