Welcome To UTPedia

We would like to introduce you, the new knowledge repository product called UTPedia. The UTP Electronic and Digital Intellectual Asset. It stores digitized version of thesis, final year project reports and past year examination questions.

Browse content of UTPedia using Year, Subject, Department and Author and Search for required document using Searching facilities included in UTPedia. UTPedia with full text are accessible for all registered users, whereas only the physical information and metadata can be retrieved by public users. UTPedia collaborating and connecting peoples with university’s intellectual works from anywhere.

Disclaimer - Universiti Teknologi PETRONAS shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.Best viewed using Mozilla Firefox 3 or IE 7 with resolution 1024 x 768.

DYNAMIC ANT COLONY SYSTEM WITH THREE LEVEL UPDATE FEATURE SELECTION FOR INTRUSION DETECTION

MEHMOOD, TAHIR (2016) DYNAMIC ANT COLONY SYSTEM WITH THREE LEVEL UPDATE FEATURE SELECTION FOR INTRUSION DETECTION. Masters thesis, Universiti Teknologi PETRONAS.

[img] PDF
Restricted to Registered users only

Download (7Mb)

Abstract

Current era is known as the age of digital information and general mean of access to this information is computer networks. The use of network technology also make in formation insecure. Network intrusion detection systems play a vital role in network security and provide ways for restricting the unauthorized use of information or data. Internet security is one of the major issue in the current internet advancement. Con fidentiality, Integrity, and Availability of the data are the major concern for the secure systems. Intruder always try to breach the security of the systems by exploiting a num ber of parameters. Intrusion Detection System (IDS) is designed to detect intrusions in the data. Different detection methods have been used in these systems including Signature-based and Anomaly-based. The signature-based detection method is good to detect known attacks but it cannot detect novel attacks, as it only looks for signatures in the data which are fed in its knowledge base. On the other hand, Anomaly-based detection method is good to detect novel attacks, as it looks for exceptional patterns in the data on the cost of high numbers of false positives.

Item Type: Thesis (Masters)
Academic Subject : Academic Department - Information Communication Technology
Subject: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Sciences and Information Technology > Computer and Information Sciences
Depositing User: Ahmad Suhairi Mohamed Lazim
Date Deposited: 24 Sep 2021 14:52
Last Modified: 24 Sep 2021 14:52
URI: http://utpedia.utp.edu.my/id/eprint/21867

Actions (login required)

View Item View Item

Document Downloads

More statistics for this item...