An enhancement of classification technique based on rough set theory for intrusion detection system application
An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. However, accuracy performance is one of the issues in IDS application. Meanwhile, classification is one of...
| Main Author: | Noor Suhana, Sulaiman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/29915/1/An%20enhancement%20of%20classification%20technique%20based%20on%20rough%20set%20theoryfor%20intrusion%20detection%20system%20application.wm.pdf |
Similar Items
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009)
by: Nur Aniza, Alang Ismail
Published: (2009)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Customer churn classification in telecommunication company using rough set theory
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
Rough Set Rules Extraction for Student Programming Skills
by: Kerwad, Mokhtar Massoud
Published: (2006)
by: Kerwad, Mokhtar Massoud
Published: (2006)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniques
by: Bakhdlaghi, Yousef
Published: (2013)
by: Bakhdlaghi, Yousef
Published: (2013)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
Rough sets theory for travel demand analysis in Malaysia
by: Wong, Jenn Hwee
Published: (2008)
by: Wong, Jenn Hwee
Published: (2008)
Intrusive system calls analysis for intrusion detection system
by: Ramakrishna, Pathmenanthan
Published: (2004)
by: Ramakrishna, Pathmenanthan
Published: (2004)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Predicting Accuracy of Income a Year Using Rough Set Theory
by: Zuraihah, Ngadengon
Published: (2009)
by: Zuraihah, Ngadengon
Published: (2009)
Using rough set through for classification of image segmentation data
by: Diallo Abdoulaye, Kindy
Published: (2014)
by: Diallo Abdoulaye, Kindy
Published: (2014)
An enhanced resampling technique for imbalanced data sets
by: Maisarah, Zorkeflee
Published: (2015)
by: Maisarah, Zorkeflee
Published: (2015)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
New Learning Models for Generating Classification Rules Based on Rough Set Approach
by: Al Shalabi, Luai Abdel Lateef
Published: (2000)
by: Al Shalabi, Luai Abdel Lateef
Published: (2000)
Enhanced fast attack detection technique for network intrusion detection system
by: Abdollah, Mohd Faizal
Published: (2009)
by: Abdollah, Mohd Faizal
Published: (2009)
Arabic language script and encoding identification with support vector machines and rough set theory
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
by: Othman, Mohamad Lutfi
Published: (2011)
by: Othman, Mohamad Lutfi
Published: (2011)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
by: Saeed, Walid
Published: (2005)
by: Saeed, Walid
Published: (2005)
Enhanced alzheimer’s disease classification scheme using 3d features
by: Aow, Yong Li Yew
Published: (2021)
by: Aow, Yong Li Yew
Published: (2021)
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
by: Leila , Mohammadpour
Published: (2024)
by: Leila , Mohammadpour
Published: (2024)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
New Parameter Reduction of Soft Sets
by: Ma, Xiuqin
Published: (2012)
by: Ma, Xiuqin
Published: (2012)
Supplementary exam tracking system (SETS)
by: Heng, Jooi Huang
Published: (2007)
by: Heng, Jooi Huang
Published: (2007)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Application Software Maintenance Process : A Comparative Study
by: Suhana, Saidin
Published: (2004)
by: Suhana, Saidin
Published: (2004)
Classification of stress based on speech features
by: Jasim, Arshed Ahmed
Published: (2014)
by: Jasim, Arshed Ahmed
Published: (2014)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
Hybrid fuzzy techniques for unsupervised intrusion detection system
by: Chimphlee, Witcha
Published: (2008)
by: Chimphlee, Witcha
Published: (2008)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Enhancing Accuracy Of Credit Scoring Classification With Imbalance Data Using Synthetic Minority Oversampling Technique-Support Vector Machine (SMOTE-SVM) Model
by: Bingamawa, Muhammad Tosan
Published: (2017)
by: Bingamawa, Muhammad Tosan
Published: (2017)
An anti virus scheme using digital signature and anomaly detection techniques
by: Subramaniam, Suresh Babu
Published: (2003)
by: Subramaniam, Suresh Babu
Published: (2003)
Similar Items
-
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009) -
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007) -
Customer churn classification in telecommunication company using rough set theory
by: Nur Syafiqah, Mohd Nafis
Published: (2016) -
Rough Set Rules Extraction for Student Programming Skills
by: Kerwad, Mokhtar Massoud
Published: (2006) -
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)