Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/9850
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Information and Communication | en_US |
dc.date.accessioned | 2013-07-11T10:33:57Z | - |
dc.date.available | 2013-07-11T10:33:57Z | - |
dc.date.issued | 2013-07-11 | - |
dc.identifier.uri | http://hdl.handle.net/10603/9850 | - |
dc.description.abstract | The world is linked and interconnected by means of computer networks in various extents of processes, events and applications. The networks must be scalable to support increasing number of users and there is a need for greater capacity and performance. In this circumstance, every part of the operation should carefully maintain the systems in an excellent phase of security. In general, the kind of users and the injection of network packets into the internet sectors are not under specific control. The security and effectiveness of a wired and wireless network system are compromised due to intrusion. An intruder attempts to gain doorway access to a system or disturb the normal operations. The literatures in the area of incidental response deal with the detection, reaction, prevention and correction. Intrusion reaction should limit the loss due to invasion and trigger measures to return to normal state as early as possible. Intrusion correction concludes the reinstatement of operations and makes necessary actions in order to prevent similar attack eventually. This thesis focuses on detection of both attack and normal traffics by analyzing the signatures of the data packet taken from the KDD Cup99 data. The bench mark intrusion detection features are constructed by observing the traffic over a time window and are made available in KDD Cup99 data. In this thesis, the constructed features are used for clustering the traffic by working out the statistical distribution and by attaching a label to the cluster for further classification. Then Adaboost based classification is made using neural network as weak classification. There are varieties of types such as continuous and discrete those are available in the intrusion detection features. Also, due to the high state space complements with these features, the pattern recognition techniques do not yield good classification results. Thus, rule based intrusion detection is proposed in this thesis and the results obtained are promising. | en_US |
dc.format.extent | xv, 119p. | en_US |
dc.language | English | en_US |
dc.relation | No. of references 107 | en_US |
dc.rights | university | en_US |
dc.title | Study and analysis of network intrusion detection system by designing rule based filter | en_US |
dc.creator.researcher | Gowrison G | en_US |
dc.subject.keyword | Network security system | en_US |
dc.description.note | References p. 106-117, List of publications p. 118 | en_US |
dc.contributor.guide | Ramar K | en_US |
dc.publisher.place | Chennai | en_US |
dc.publisher.university | Anna University | en_US |
dc.publisher.institution | Faculty of Information and Communication Engineering | en_US |
dc.date.registered | 01/11/2010 | en_US |
dc.date.completed | 25/10/2011 | en_US |
dc.date.awarded | 2011 | en_US |
dc.format.dimensions | -- | en_US |
dc.format.accompanyingmaterial | None | en_US |
dc.source.university | University | en_US |
dc.type.degree | Ph.D. | en_US |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.65 kB | Adobe PDF | View/Open |
02_certificates.pdf | 931.81 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 16.04 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 16.83 kB | Adobe PDF | View/Open | |
05_contents.pdf | 45.72 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 40.02 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 80.69 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 64.8 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 91.34 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 124.44 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 45.24 kB | Adobe PDF | View/Open | |
12_references.pdf | 61.85 kB | Adobe PDF | View/Open | |
13_publications.pdf | 14.24 kB | Adobe PDF | View/Open | |
14_vitae.pdf | 11.82 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: