Enhancing intrusion detection system performance using machine learning approaches / Hany Mohammed Ahmed ; Supervised Hesham Hefny , Abdelaziz Ahmed
Material type: TextLanguage: English Publication details: Cairo : Hany Mohammed Ahmed , 2019Description: 110 Leaves : charts , facsimiles ; 30cmOther title:- تحس{u٠٦أأ}ن أداء أنظمة كشف التسلل باستخدام أساليب تعلم الماكينة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2019.Ha.E (Browse shelf(Opens below)) | Not for loan | 01010110079300000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2019.Ha.E (Browse shelf(Opens below)) | 79300.CD | Not for loan | 01020110079300000 |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
With the growth of the Internet, more and more people are getting connected to the Internet every day to take advantage of internet benefits. On one side, the Internet brings in wonderful potential to business and individuals in terms of reaching the end users. At the same time it also brings in portion of security risk to the individuals and organizations over the network. With the growth of cyberattacks, information safety has become an important issue all over the world. Intrusion detection systems (IDSs) are an essential element for network security infrastructure The topic of Computer Network Intrusion Detection Systems (IDSs) is a very interesting research issue actively pursued by many investigators. The goal of intrusion detection is to monitor network assets and to detect abnormal behavior and misuse. This concept has been around for the past several years but only recently it has seen a dramatic rise in interest of researchers and system developers for incorporation into the overall information security infrastructure. The need for an IDS has become critical since the number of novel attacks, internet worms and malwares has kept growing in recent years, besides a huge size of datasets in real world in different networks and in the internet used for IDS represents a real challenge for most researcher works. However, most of today{u2019}s IDS generate high detection accuracy and miss many attacks because of a deficiency in their ability to discriminate attacks from legitimate behaviors. These unreliable results damage the main task of IDSs
Issued also as CD
There are no comments on this title.