Please use this identifier to cite or link to this item:
https://scholarhub.balamand.edu.lb/handle/uob/3162
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Daba, Jihad S. | en_US |
dc.contributor.author | Elias, Joseph | en_US |
dc.date.accessioned | 2020-12-23T14:33:57Z | - |
dc.date.available | 2020-12-23T14:33:57Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | https://scholarhub.balamand.edu.lb/handle/uob/3162 | - |
dc.description | Includes bibliographical references (p. 38). | en_US |
dc.description | Supervised by Dr. Jihad Daba. | en_US |
dc.description.abstract | The volume or size of the computer network and developed applications grows massively everyday, the potential to be exposed to a cyber attack is significant and the damage could be massive. Thus, Intrusion Detection Systems (IDSs) or Intrusion Prevention Systems (IPSs) are mandatory in the line of defense against large and complex networks. Machine learning can make the use of traditional Intrusion Detection Systems (IDS) a way poorer than it is today. They could learn the preferences of the security officers and dispay the sort of risks that the officer has already been generally interested in. As usual, the toughest thing with learning AI's is to teach them to take the correct calls. Machines learning could be trained as the as a rule-based system. AIs can also bind together the activities without anyone else's interactions. Those are inconsequential yet, when consolidated they may demonstrate that an attack is underway. In this work I'll compare machine learningbased IDS with traditional IDS, and explain how the AIs can be educated through. A decent number of datasets that experiences shortage of traffic diversity and volumes, some of them do not cover the variety of attacks, while other datasets suffer from anonymized packet information and payload which cannot meet the reality, or suffer from a deficiency in feature set and metadata. In this work we experiment with a credible dataset that contains benign flows and 12 known attack flows, which meets realistic network. The dataset is publicly available. Thus, we evaluate the performance of a comprehensive set of network traffic features and machine learning algorithms to indicate the best set of features for detecting the attack types. | en_US |
dc.description.statementofresponsibility | by Joseph Elias | en_US |
dc.format.extent | viii, 38 p. :ill., tables ;30 cm | en_US |
dc.language.iso | eng | en_US |
dc.rights | This object is protected by copyright, and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the object beyond the personal and educational use exceptions must be obtained from the copyright holder | en_US |
dc.subject.lcsh | Artificial intelligence | en_US |
dc.subject.lcsh | Neural networks (Computer science) | en_US |
dc.title | Artificial intelligence for intrusion detection system | en_US |
dc.type | Project | en_US |
dc.contributor.department | Department of Computer Engineering | en_US |
dc.contributor.faculty | Faculty of Engineering | en_US |
dc.contributor.institution | University of Balamand | en_US |
dc.date.catalogued | 2018-09-10 | - |
dc.description.degree | MS in Computer Engineering | en_US |
dc.description.status | Published | en_US |
dc.identifier.ezproxyURL | http://ezsecureaccess.balamand.edu.lb/login?url=http://olib.balamand.edu.lb/projects_and_theses/GP-CoE-93.pdf | en_US |
dc.identifier.OlibID | 186149 | - |
dc.provenance.recordsource | Olib | en_US |
Appears in Collections: | UOB Theses and Projects |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.