An enhancement of classification technique based on rough set theory for intrusion detection system application
An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. However, accuracy performance is one of the issues in IDS application. Meanwhile, classification is one of...
| Auteur principal: | Noor Suhana, Sulaiman |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2019
|
| Sujets: | |
| Accès en ligne: | http://umpir.ump.edu.my/id/eprint/29915/1/An%20enhancement%20of%20classification%20technique%20based%20on%20rough%20set%20theoryfor%20intrusion%20detection%20system%20application.wm.pdf |
Documents similaires
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
par: Nur Aniza, Alang Ismail
Publié: (2009)
par: Nur Aniza, Alang Ismail
Publié: (2009)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
par: Sulaiman, Noor Suhana
Publié: (2007)
par: Sulaiman, Noor Suhana
Publié: (2007)
Customer churn classification in telecommunication company using rough set theory
par: Nur Syafiqah, Mohd Nafis
Publié: (2016)
par: Nur Syafiqah, Mohd Nafis
Publié: (2016)
Rough Set Rules Extraction for Student Programming Skills
par: Kerwad, Mokhtar Massoud
Publié: (2006)
par: Kerwad, Mokhtar Massoud
Publié: (2006)
Trademark image classification approaches using neural network and rough set theory
par: Saad, Puteh
Publié: (2003)
par: Saad, Puteh
Publié: (2003)
Analysis of an intrusion detection system based on immunilogy
par: Saeed Al-Amoudi, Mohammed Hussein
Publié: (2008)
par: Saeed Al-Amoudi, Mohammed Hussein
Publié: (2008)
Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniques
par: Bakhdlaghi, Yousef
Publié: (2013)
par: Bakhdlaghi, Yousef
Publié: (2013)
Intrusion Detection by Port Scan Using Snort
par: Alkhushayni, Suboh Mohammad Shehadah
Publié: (2008)
par: Alkhushayni, Suboh Mohammad Shehadah
Publié: (2008)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
par: Lim, Khai Yin
Publié: (2017)
par: Lim, Khai Yin
Publié: (2017)
Rough sets theory for travel demand analysis in Malaysia
par: Wong, Jenn Hwee
Publié: (2008)
par: Wong, Jenn Hwee
Publié: (2008)
Intrusive system calls analysis for intrusion detection system
par: Ramakrishna, Pathmenanthan
Publié: (2004)
par: Ramakrishna, Pathmenanthan
Publié: (2004)
Intrusion detection using artificial neural network / Gan Sze Kai
par: Gan , Sze Kai
Publié: (2002)
par: Gan , Sze Kai
Publié: (2002)
Predicting Accuracy of Income a Year Using Rough Set Theory
par: Zuraihah, Ngadengon
Publié: (2009)
par: Zuraihah, Ngadengon
Publié: (2009)
Using rough set through for classification of image segmentation data
par: Diallo Abdoulaye, Kindy
Publié: (2014)
par: Diallo Abdoulaye, Kindy
Publié: (2014)
An enhanced resampling technique for imbalanced data sets
par: Maisarah, Zorkeflee
Publié: (2015)
par: Maisarah, Zorkeflee
Publié: (2015)
A fast learning network with improved particle swarm optimization for intrusion detection system
par: Ali, Mohammed Hasan
Publié: (2019)
par: Ali, Mohammed Hasan
Publié: (2019)
An architectural design for a hybrid intrusion detection system for database
par: Haratian, Mohammad Hossein
Publié: (2009)
par: Haratian, Mohammad Hossein
Publié: (2009)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
par: Adnan, -
Publié: (2016)
par: Adnan, -
Publié: (2016)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
par: Alaidaros, Hashem Mohammed
Publié: (2017)
par: Alaidaros, Hashem Mohammed
Publié: (2017)
New Learning Models for Generating Classification Rules Based on Rough Set Approach
par: Al Shalabi, Luai Abdel Lateef
Publié: (2000)
par: Al Shalabi, Luai Abdel Lateef
Publié: (2000)
Enhanced fast attack detection technique for network intrusion detection system
par: Abdollah, Mohd Faizal
Publié: (2009)
par: Abdollah, Mohd Faizal
Publié: (2009)
Arabic language script and encoding identification with support vector machines and rough set theory
par: Mohamed Sidya, Mohamed Ould
Publié: (2007)
par: Mohamed Sidya, Mohamed Ould
Publié: (2007)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
par: Wasswa, Hassan
Publié: (2019)
par: Wasswa, Hassan
Publié: (2019)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
par: Firas (M.H.) S., Najjar
Publié: (2016)
par: Firas (M.H.) S., Najjar
Publié: (2016)
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
par: Othman, Mohamad Lutfi
Publié: (2011)
par: Othman, Mohamad Lutfi
Publié: (2011)
Data Mining Classification Techniques and Performances on Medical Data
par: Benyehmad, Yahyia Mohammed M. Ali
Publié: (2006)
par: Benyehmad, Yahyia Mohammed M. Ali
Publié: (2006)
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
par: Saeed, Walid
Publié: (2005)
par: Saeed, Walid
Publié: (2005)
Enhanced alzheimer’s disease classification scheme using 3d features
par: Aow, Yong Li Yew
Publié: (2021)
par: Aow, Yong Li Yew
Publié: (2021)
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
par: Leila , Mohammadpour
Publié: (2024)
par: Leila , Mohammadpour
Publié: (2024)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
par: He , Xiao Dong
Publié: (2008)
par: He , Xiao Dong
Publié: (2008)
New Parameter Reduction of Soft Sets
par: Ma, Xiuqin
Publié: (2012)
par: Ma, Xiuqin
Publié: (2012)
Supplementary exam tracking system (SETS)
par: Heng, Jooi Huang
Publié: (2007)
par: Heng, Jooi Huang
Publié: (2007)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
par: Hammoudeh, S. Alamri
Publié: (2020)
par: Hammoudeh, S. Alamri
Publié: (2020)
Application Software Maintenance Process : A Comparative Study
par: Suhana, Saidin
Publié: (2004)
par: Suhana, Saidin
Publié: (2004)
Classification of stress based on speech features
par: Jasim, Arshed Ahmed
Publié: (2014)
par: Jasim, Arshed Ahmed
Publié: (2014)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
par: Hamarsheh, Mu'taz M. N.
Publié: (2008)
par: Hamarsheh, Mu'taz M. N.
Publié: (2008)
Hybrid fuzzy techniques for unsupervised intrusion detection system
par: Chimphlee, Witcha
Publié: (2008)
par: Chimphlee, Witcha
Publié: (2008)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
par: Keshkeh, Kinan
Publié: (2022)
par: Keshkeh, Kinan
Publié: (2022)
Enhancing Accuracy Of Credit Scoring Classification With Imbalance Data Using Synthetic Minority Oversampling Technique-Support Vector Machine (SMOTE-SVM) Model
par: Bingamawa, Muhammad Tosan
Publié: (2017)
par: Bingamawa, Muhammad Tosan
Publié: (2017)
An anti virus scheme using digital signature and anomaly detection techniques
par: Subramaniam, Suresh Babu
Publié: (2003)
par: Subramaniam, Suresh Babu
Publié: (2003)
Documents similaires
-
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
par: Nur Aniza, Alang Ismail
Publié: (2009) -
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
par: Sulaiman, Noor Suhana
Publié: (2007) -
Customer churn classification in telecommunication company using rough set theory
par: Nur Syafiqah, Mohd Nafis
Publié: (2016) -
Rough Set Rules Extraction for Student Programming Skills
par: Kerwad, Mokhtar Massoud
Publié: (2006) -
Trademark image classification approaches using neural network and rough set theory
par: Saad, Puteh
Publié: (2003)