Intrusion detection using artificial neural network / Gan Sze Kai
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection Sys...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Published: |
2002
|
Subjects: | |
Online Access: | http://studentsrepo.um.edu.my/9982/1/Gan_Sze_Kai_%2D_Academic_exercise.pdf http://studentsrepo.um.edu.my/9982/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | According to this thesis title - Intrusion Detection Using Artificial Neural Network is
whereby a neural network technology must be built inside the Intrusion Detection
System (IDS). IDS is one of the security techniques, which is being used currently. It
can be said that, Intrusion Detection System is a companion of the firewall, (of is
beyond the firewall). The firewall is analog to the locker in (our houses to lock the
windows and doors) to prevent intruders' break-in. Therefore, the IDS is a burglar
alarm system to alert the user when an intruder successfully get through the firewall.
In addition, it is also a vulnerable scanner to scan the network traffic to detect any
existing intruder at that period of usage.
In this project, neural network is used to analyze the network traffic, which will be
implemented into the IDS to improve its ability to distinguish its authorized user and
the intruder. Neural network is itself, a classification system that will enable the IDS
to classify between its user and system activities. ('This project is only focus on
analysis statistical network traffic).
Hence, in my Chapter II - Literature Review, there will be a discussion providing
details of the neural network and the IDS. Lastly, in Chapter ID, report on the system
design of the entire system will be discussed too. System implementation and system
testing is discuss in chapter IV and chapter V. A conclusion as well as presentation
will then be made preceding the end of the above report.
|
---|