File:Neural detection of malicious network activities using a new direct parsing and feature extraction technique (IA neuraldetectiono1094547298).pdf
Original file (1,275 × 1,650 pixels, file size: 1.69 MB, MIME type: application/pdf, 76 pages)
Captions
Summary[edit]
Neural detection of malicious network activities using a new direct parsing and feature extraction technique ( ) | ||
---|---|---|
Author |
Low, Cheng Hong |
|
Title |
Neural detection of malicious network activities using a new direct parsing and feature extraction technique |
|
Publisher |
Monterey, California: Naval Postgraduate School |
|
Description |
The aim of this thesis is to develop an intrusion detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of operating in real-time applications, ways of improving the efficiency of the IDS without sacrificing the probability of correct classification (PCC) are also considered. Knowledge Data and Discovery Cup 99 data is used to evaluate the IDS architecture. Two neural network (NN) architectures were designed and compared through simulation; the first architecture uses a single NN, while the second uses the merged output of three NNs in parallel. Results show that a three-parallel NN implementation has similar classification performance and a shorter training time than with a single NN implementation. PCC is on the order of 93% for denial-of-service attacks and 96% for normal traffic. The classification results for the R2L and U2R attacks are poor due to the lack of available training data. Subjects: intrusion detection systems; neural networks |
|
Language | English | |
Publication date | September 2015 | |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
neuraldetectiono1094547298 |
|
Source | ||
Permission (Reusing this file) |
Copyright is reserved by the copyright owner. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 06:58, 23 July 2020 | 1,275 × 1,650, 76 pages (1.69 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection neuraldetectiono1094547298 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #22952) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Neural detection of malicious network activities using a new direct parsing and feature extraction technique |
---|---|
Author | Low, Cheng Hong |
Software used | Low, Cheng Hong |
Conversion program | Adobe PDF Library 11.0 |
Encrypted | no |
Page size |
|
Version of PDF format | 1.4 |