Intrusion detection using artificial neural network / Gan Sze Kai

According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection Sys...

Full description

Saved in:
Bibliographic Details
Main Author: Gan , Sze Kai
Format: Thesis
Published: 2002
Subjects:
Online Access:http://studentsrepo.um.edu.my/9982/1/Gan_Sze_Kai_%2D_Academic_exercise.pdf
http://studentsrepo.um.edu.my/9982/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection System is a companion of the firewall, (of is beyond the firewall). The firewall is analog to the locker in (our houses to lock the windows and doors) to prevent intruders' break-in. Therefore, the IDS is a burglar alarm system to alert the user when an intruder successfully get through the firewall. In addition, it is also a vulnerable scanner to scan the network traffic to detect any existing intruder at that period of usage. In this project, neural network is used to analyze the network traffic, which will be implemented into the IDS to improve its ability to distinguish its authorized user and the intruder. Neural network is itself, a classification system that will enable the IDS to classify between its user and system activities. ('This project is only focus on analysis statistical network traffic). Hence, in my Chapter II - Literature Review, there will be a discussion providing details of the neural network and the IDS. Lastly, in Chapter ID, report on the system design of the entire system will be discussed too. System implementation and system testing is discuss in chapter IV and chapter V. A conclusion as well as presentation will then be made preceding the end of the above report.