Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/341551
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialAn anomaly based network intrusion detection using clustering algorithms
dc.date.accessioned2021-09-22T07:17:24Z-
dc.date.available2021-09-22T07:17:24Z-
dc.identifier.urihttp://hdl.handle.net/10603/341551-
dc.description.abstractIn recent decades the role of internet in day-to-day activities are rapidly increased due to the accessibility and completion of task with in fraction of seconds, as well as the banking and billing process are proceeds through online. Due the character of openness in network the security is the big thread for the users.The intruders are enter in to the network in different manners to get the access or change the original contents as well as block the connection, etc. The intrusion detection (IDS) process is a mandate one to overcome the issues, the IDS is classified as misuse detection as well as anomaly detection. The misuse detection technique is working based on the signature matching concept and the anomaly method is based on the detection of known as well as unknown attacks.The data mining plays a vital role in the process of intrusion detection technique, The goal of data mining is to extract knowledge from a data set in a human-understandable structure and involves data management, data preprocessing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of found structure, visualization and online updating.Our sturdy is mostly focus on anomaly based network intrusion detection system because this one track and identify the known attacks and new attack faced by the system or networks. The basic concept of IDS is to detect the anomalies and raise the alarm to indicate the administrator, but the intrusion prevention system (IPS) also used to take some necessary action to prevent the attack from different types of sources. newline
dc.format.extentxvii,111p.
dc.languageEnglish
dc.relationp.104-110
dc.rightsuniversity
dc.titleAn anomaly based network intrusion detection using clustering algorithms
dc.title.alternative
dc.creator.researcherJackins V
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordNetwork intrusion
dc.subject.keywordAlgorithms
dc.description.note
dc.contributor.guideShalini Punithavathani D
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registeredn.d.
dc.date.completed2020
dc.date.awarded2020
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File237.27 kBAdobe PDFView/Open
02_certificates.pdf114.47 kBAdobe PDFView/Open
03_vivaproceedings.pdf594.77 kBAdobe PDFView/Open
04_bonafidecertificate.pdf370.51 kBAdobe PDFView/Open
05_abstracts.pdf179.92 kBAdobe PDFView/Open
06_acknowledgements.pdf397.42 kBAdobe PDFView/Open
07_contents.pdf204.07 kBAdobe PDFView/Open
08_listoftables.pdf337.6 kBAdobe PDFView/Open
09_listoffigures.pdf356.97 kBAdobe PDFView/Open
10_listofabbreviations.pdf87.46 kBAdobe PDFView/Open
11_chapter1.pdf320.24 kBAdobe PDFView/Open
12_chapter2.pdf133.19 kBAdobe PDFView/Open
13_chapter3.pdf1.04 MBAdobe PDFView/Open
14_chapter4.pdf256.63 kBAdobe PDFView/Open
15_chapter5.pdf453.32 kBAdobe PDFView/Open
16_conclusion.pdf13.1 kBAdobe PDFView/Open
17_references.pdf194.56 kBAdobe PDFView/Open
18_listofpublications.pdf80.57 kBAdobe PDFView/Open
80_recommendation.pdf142.34 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: