Intrusion detection using artificial neural network / Gan Sze Kai

According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection Sys...

Full description

Saved in:
Bibliographic Details
Main Author: Gan , Sze Kai
Format: Thesis
Published: 2002
Subjects:
Online Access:http://studentsrepo.um.edu.my/9982/1/Gan_Sze_Kai_%2D_Academic_exercise.pdf
http://studentsrepo.um.edu.my/9982/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.stud.9982
record_format eprints
spelling my.um.stud.99822019-06-13T00:48:55Z Intrusion detection using artificial neural network / Gan Sze Kai Gan , Sze Kai QA76 Computer software According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection System is a companion of the firewall, (of is beyond the firewall). The firewall is analog to the locker in (our houses to lock the windows and doors) to prevent intruders' break-in. Therefore, the IDS is a burglar alarm system to alert the user when an intruder successfully get through the firewall. In addition, it is also a vulnerable scanner to scan the network traffic to detect any existing intruder at that period of usage. In this project, neural network is used to analyze the network traffic, which will be implemented into the IDS to improve its ability to distinguish its authorized user and the intruder. Neural network is itself, a classification system that will enable the IDS to classify between its user and system activities. ('This project is only focus on analysis statistical network traffic). Hence, in my Chapter II - Literature Review, there will be a discussion providing details of the neural network and the IDS. Lastly, in Chapter ID, report on the system design of the entire system will be discussed too. System implementation and system testing is discuss in chapter IV and chapter V. A conclusion as well as presentation will then be made preceding the end of the above report. 2002 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/9982/1/Gan_Sze_Kai_%2D_Academic_exercise.pdf Gan , Sze Kai (2002) Intrusion detection using artificial neural network / Gan Sze Kai. Undergraduates thesis, University of Malaya. http://studentsrepo.um.edu.my/9982/
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Student Repository
url_provider http://studentsrepo.um.edu.my/
topic QA76 Computer software
spellingShingle QA76 Computer software
Gan , Sze Kai
Intrusion detection using artificial neural network / Gan Sze Kai
description According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a neural network technology must be built inside the Intrusion Detection System (IDS). IDS is one of the security techniques, which is being used currently. It can be said that, Intrusion Detection System is a companion of the firewall, (of is beyond the firewall). The firewall is analog to the locker in (our houses to lock the windows and doors) to prevent intruders' break-in. Therefore, the IDS is a burglar alarm system to alert the user when an intruder successfully get through the firewall. In addition, it is also a vulnerable scanner to scan the network traffic to detect any existing intruder at that period of usage. In this project, neural network is used to analyze the network traffic, which will be implemented into the IDS to improve its ability to distinguish its authorized user and the intruder. Neural network is itself, a classification system that will enable the IDS to classify between its user and system activities. ('This project is only focus on analysis statistical network traffic). Hence, in my Chapter II - Literature Review, there will be a discussion providing details of the neural network and the IDS. Lastly, in Chapter ID, report on the system design of the entire system will be discussed too. System implementation and system testing is discuss in chapter IV and chapter V. A conclusion as well as presentation will then be made preceding the end of the above report.
format Thesis
author Gan , Sze Kai
author_facet Gan , Sze Kai
author_sort Gan , Sze Kai
title Intrusion detection using artificial neural network / Gan Sze Kai
title_short Intrusion detection using artificial neural network / Gan Sze Kai
title_full Intrusion detection using artificial neural network / Gan Sze Kai
title_fullStr Intrusion detection using artificial neural network / Gan Sze Kai
title_full_unstemmed Intrusion detection using artificial neural network / Gan Sze Kai
title_sort intrusion detection using artificial neural network / gan sze kai
publishDate 2002
url http://studentsrepo.um.edu.my/9982/1/Gan_Sze_Kai_%2D_Academic_exercise.pdf
http://studentsrepo.um.edu.my/9982/
_version_ 1738506321657856000
score 13.209306