The implementation of A Network Intrusion Detection System Based on Anomaly Data Stream Mining
碩士 === 國立中興大學 === 資訊科學系所 === 94 === In recent years, there has been a dramatic proliferation of internet applications and security issues of internet suffered severely. Hence, many defense techniques of network security were developed and the intrusion detection system was one of them. Research on i...
Main Authors: | Yen-Feng Kuo, 郭彥鋒 |
---|---|
Other Authors: | 廖宜恩 |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15210171209583186891 |
Similar Items
-
Data mining approaches for network intrusion detection: from dimensionality reduction to misuse and anomaly detection
by: Syarif, Iwan, et al.
Published: (2012) -
Data mining log file streams for the detection of anomalies
by: Green, Brian
Published: (2015) -
Data Mining For Network Intrusion Detection
by: Li-Yu Ma, et al.
Published: (2005) -
Data Visualization Applied for Anomaly Detection in Intrusion Detection Systems
by: Kai-Wei Chen, et al.
Published: (2018) -
Applying Data Mining Techniques on Intrusion Detection Systems
by: Chuang, Kuo-Wei, et al.
Published: (2010)