dc.contributor.author |
Helali, Rasha Gaffer Mohammed |
|
dc.contributor.author |
Supervisor - Awad Mohammed Awad Al kareim |
|
dc.date.accessioned |
2014-10-21T11:15:02Z |
|
dc.date.available |
2014-10-21T11:15:02Z |
|
dc.date.issued |
2008-09-01 |
|
dc.identifier.citation |
Helali ,Rasha Gaffer Mohammed.Design and Implementation of Data Mining-Based Intrusion Detection System/Rasha Gaffer Mohammed Helali ;Awad Mohammed Awad Al kareim.-Khartoum:Sudan University of Science and Technology,College of Computer Science and Information Technology,2005.49p. : ill;28cm.-M.sc |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/7411 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
Significant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. In point of fact, most of the current systems are weak at detecting novel attacks without generating false alarms. This study proposes a solution to such limitations through data mining-based Network Intrusion Detection System NIDS. The proposed framework combines both misuse and anomaly detection techniques using data mining approaches such as decision tree (C5.0 algorithm) and distance-based clustering (Two-steps algorithm). As case study, the proposed framework is implemented to CCSIT (College of Computer Science and Information Technology) Network at Sudan University of Science and Technology (SUST), which clearly shows and reflects its applicability and effectiveness. Conclusively, the derived experimental results confirm that using of data mining approaches for both misuse and anomaly detection has a great promise in network security context. |
en_US |
dc.description.sponsorship |
Sudan University of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science and Technology |
en_US |
dc.subject |
Intrusion Detection System |
en_US |
dc.subject |
generating false alarms |
en_US |
dc.subject |
C5.0 algorithm) |
en_US |
dc.title |
Design and Implementation of Data Mining-Based Intrusion Detection System |
en_US |
dc.title.alternative |
تصميم وتنفيذ نظام لكشف إختراق الشبكة مبنى على تقنية تنقيب البيانات |
en_US |
dc.type |
Thesis |
en_US |