Please use this identifier to cite or link to this item: https://scholarhub.balamand.edu.lb/handle/uob/3162
DC FieldValueLanguage
dc.contributor.advisorDaba, Jihad S.en_US
dc.contributor.authorElias, Josephen_US
dc.date.accessioned2020-12-23T14:33:57Z-
dc.date.available2020-12-23T14:33:57Z-
dc.date.issued2018-
dc.identifier.urihttps://scholarhub.balamand.edu.lb/handle/uob/3162-
dc.descriptionIncludes bibliographical references (p. 38).en_US
dc.descriptionSupervised by Dr. Jihad Daba.en_US
dc.description.abstractThe volume or size of the computer network and developed applications grows massively everyday, the potential to be exposed to a cyber attack is significant and the damage could be massive. Thus, Intrusion Detection Systems (IDSs) or Intrusion Prevention Systems (IPSs) are mandatory in the line of defense against large and complex networks. Machine learning can make the use of traditional Intrusion Detection Systems (IDS) a way poorer than it is today. They could learn the preferences of the security officers and dispay the sort of risks that the officer has already been generally interested in. As usual, the toughest thing with learning AI's is to teach them to take the correct calls. Machines learning could be trained as the as a rule-based system. AIs can also bind together the activities without anyone else's interactions. Those are inconsequential yet, when consolidated they may demonstrate that an attack is underway. In this work I'll compare machine learningbased IDS with traditional IDS, and explain how the AIs can be educated through. A decent number of datasets that experiences shortage of traffic diversity and volumes, some of them do not cover the variety of attacks, while other datasets suffer from anonymized packet information and payload which cannot meet the reality, or suffer from a deficiency in feature set and metadata. In this work we experiment with a credible dataset that contains benign flows and 12 known attack flows, which meets realistic network. The dataset is publicly available. Thus, we evaluate the performance of a comprehensive set of network traffic features and machine learning algorithms to indicate the best set of features for detecting the attack types.en_US
dc.description.statementofresponsibilityby Joseph Eliasen_US
dc.format.extentviii, 38 p. :ill., tables ;30 cmen_US
dc.language.isoengen_US
dc.rightsThis object is protected by copyright, and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the object beyond the personal and educational use exceptions must be obtained from the copyright holderen_US
dc.subject.lcshArtificial intelligenceen_US
dc.subject.lcshNeural networks (Computer science)en_US
dc.titleArtificial intelligence for intrusion detection systemen_US
dc.typeProjecten_US
dc.contributor.departmentDepartment of Computer Engineeringen_US
dc.contributor.facultyFaculty of Engineeringen_US
dc.contributor.institutionUniversity of Balamanden_US
dc.date.catalogued2018-09-10-
dc.description.degreeMS in Computer Engineeringen_US
dc.description.statusPublisheden_US
dc.identifier.ezproxyURLhttp://ezsecureaccess.balamand.edu.lb/login?url=http://olib.balamand.edu.lb/projects_and_theses/GP-CoE-93.pdfen_US
dc.identifier.OlibID186149-
dc.provenance.recordsourceOliben_US
Appears in Collections:UOB Theses and Projects
Show simple item record

Record view(s)

86
checked on Nov 21, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.