Develop and Compare Machine Learning Methods for IDS
碩士 === 國立中正大學 === 資訊管理所 === 96 === In recent years, the internet and the pc become more and more widespread. The internet-based services are widely adapted by enterprises and governments. And information security plays a more and more important role in these organizations. When one organization suff...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/54912761689680082091 |
id |
ndltd-TW-096CCU05396011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096CCU053960112015-10-13T11:31:38Z http://ndltd.ncl.edu.tw/handle/54912761689680082091 Develop and Compare Machine Learning Methods for IDS 入侵偵測系統中基於機器學習方法技術之開發與比較 You Sin 游信文 碩士 國立中正大學 資訊管理所 96 In recent years, the internet and the pc become more and more widespread. The internet-based services are widely adapted by enterprises and governments. And information security plays a more and more important role in these organizations. When one organization suffers internet attack, the loss is huge. Organizations often use intrusion detection System(IDS) to stop and prevent internet attacks from crackers. And many intrusion detection methods were proposed in these years, such as machine learning methods. How about the performance of these methods? So we want to compare the performance of machine learning methods in intrusion detection systems. In this paper, we compare the performance of decision tree and support vector machine. We use the benchmark dataset, KDD Cup 99 dataset. We compare the accuracy, detection rate, false alarm rate, and accuracy of the four classes of attack, including Probe, Dos, U2R, R2L. Finally, some suggestions are proposed for the two methods. none 顏逸楓 2007 學位論文 ; thesis 42 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 資訊管理所 === 96 === In recent years, the internet and the pc become more and more widespread. The internet-based services are widely adapted by enterprises and governments. And information security plays a more and more important role in these organizations. When one organization suffers internet attack, the loss is huge. Organizations often use intrusion detection System(IDS) to stop and prevent internet attacks from crackers. And many intrusion detection methods were proposed in these years, such as machine learning methods. How about the performance of these methods? So we want to compare the performance of machine learning methods in intrusion detection systems. In this paper, we compare the performance of decision tree and support vector machine. We use the benchmark dataset, KDD Cup 99 dataset. We compare the accuracy, detection rate, false alarm rate, and accuracy of the four classes of attack, including Probe, Dos, U2R, R2L. Finally, some suggestions are proposed for the two methods.
|
author2 |
none |
author_facet |
none You Sin 游信文 |
author |
You Sin 游信文 |
spellingShingle |
You Sin 游信文 Develop and Compare Machine Learning Methods for IDS |
author_sort |
You Sin |
title |
Develop and Compare Machine Learning Methods for IDS |
title_short |
Develop and Compare Machine Learning Methods for IDS |
title_full |
Develop and Compare Machine Learning Methods for IDS |
title_fullStr |
Develop and Compare Machine Learning Methods for IDS |
title_full_unstemmed |
Develop and Compare Machine Learning Methods for IDS |
title_sort |
develop and compare machine learning methods for ids |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/54912761689680082091 |
work_keys_str_mv |
AT yousin developandcomparemachinelearningmethodsforids AT yóuxìnwén developandcomparemachinelearningmethodsforids AT yousin rùqīnzhēncèxìtǒngzhōngjīyújīqìxuéxífāngfǎjìshùzhīkāifāyǔbǐjiào AT yóuxìnwén rùqīnzhēncèxìtǒngzhōngjīyújīqìxuéxífāngfǎjìshùzhīkāifāyǔbǐjiào |
_version_ |
1716845585561026560 |