Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/7411
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHelali, Rasha Gaffer Mohammed
dc.contributor.authorSupervisor - Awad Mohammed Awad Al kareim
dc.date.accessioned2014-10-21T11:15:02Z
dc.date.available2014-10-21T11:15:02Z
dc.date.issued2008-09-01
dc.identifier.citationHelali ,Rasha Gaffer Mohammed.Design and Implementation of Data Mining-Based Intrusion Detection System/Rasha Gaffer Mohammed Helali ;Awad Mohammed Awad Al kareim.-Khartoum:Sudan University of Science and Technology,College of Computer Science and Information Technology,2005.49p. : ill;28cm.-M.scen_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/7411
dc.descriptionThesisen_US
dc.description.abstractSignificant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. In point of fact, most of the current systems are weak at detecting novel attacks without generating false alarms. This study proposes a solution to such limitations through data mining-based Network Intrusion Detection System NIDS. The proposed framework combines both misuse and anomaly detection techniques using data mining approaches such as decision tree (C5.0 algorithm) and distance-based clustering (Two-steps algorithm). As case study, the proposed framework is implemented to CCSIT (College of Computer Science and Information Technology) Network at Sudan University of Science and Technology (SUST), which clearly shows and reflects its applicability and effectiveness. Conclusively, the derived experimental results confirm that using of data mining approaches for both misuse and anomaly detection has a great promise in network security context.en_US
dc.description.sponsorshipSudan University of Science and Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science and Technologyen_US
dc.subjectIntrusion Detection Systemen_US
dc.subjectgenerating false alarmsen_US
dc.subjectC5.0 algorithm)en_US
dc.titleDesign and Implementation of Data Mining-Based Intrusion Detection Systemen_US
dc.title.alternativeتصميم وتنفيذ نظام لكشف إختراق الشبكة مبنى على تقنية تنقيب البياناتen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Design and Implementation....pdfTitle95.21 kBAdobe PDFView/Open
Research.pdf
  Restricted Access
Research1.3 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.