SUST Repository

Design and Implementation of Data Mining-Based Intrusion Detection System

Show simple item record

dc.contributor.author Helali, Rasha Gaffer Mohammed
dc.contributor.author Supervisor - Awad Mohammed Awad Al kareim
dc.date.accessioned 2014-10-21T11:15:02Z
dc.date.available 2014-10-21T11:15:02Z
dc.date.issued 2008-09-01
dc.identifier.citation Helali ,Rasha Gaffer Mohammed.Design and Implementation of Data Mining-Based Intrusion Detection System/Rasha Gaffer Mohammed Helali ;Awad Mohammed Awad Al kareim.-Khartoum:Sudan University of Science and Technology,College of Computer Science and Information Technology,2005.49p. : ill;28cm.-M.sc en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/7411
dc.description Thesis en_US
dc.description.abstract Significant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. In point of fact, most of the current systems are weak at detecting novel attacks without generating false alarms. This study proposes a solution to such limitations through data mining-based Network Intrusion Detection System NIDS. The proposed framework combines both misuse and anomaly detection techniques using data mining approaches such as decision tree (C5.0 algorithm) and distance-based clustering (Two-steps algorithm). As case study, the proposed framework is implemented to CCSIT (College of Computer Science and Information Technology) Network at Sudan University of Science and Technology (SUST), which clearly shows and reflects its applicability and effectiveness. Conclusively, the derived experimental results confirm that using of data mining approaches for both misuse and anomaly detection has a great promise in network security context. en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Intrusion Detection System en_US
dc.subject generating false alarms en_US
dc.subject C5.0 algorithm) en_US
dc.title Design and Implementation of Data Mining-Based Intrusion Detection System en_US
dc.title.alternative تصميم وتنفيذ نظام لكشف إختراق الشبكة مبنى على تقنية تنقيب البيانات en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account