Please use this identifier to cite or link to this item: http://dspace.lib.uom.gr/handle/2159/16513
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorΕυαγγελίδης, Γεώργιοςel
dc.contributor.advisorEvagelidis, Georgeen
dc.contributor.authorΚατσαβέλης, Ζήσηςel
dc.contributor.authorKatsavelis Zisisen
dc.date.accessioned2014-11-05T12:54:04Z-
dc.date.available2014-11-05T12:54:04Z-
dc.date.issued2014el
dc.identifier.urihttp://dspace.lib.uom.gr/handle/2159/16513-
dc.descriptionΔιπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.el
dc.description.abstractIn this paper we outline the basic points of the fast growing field of data mining (or as it also known knowledge discovery from data) emphasizing on one critical subdomain known as outlier detection or anomaly detection. We examine this particular area under the prospective of the computer networks security. Anomaly detection is the identification of rare, abnormal observations which contain valuable information, and for that reason they are the main objects of interest in the specific problem domain. At the first parts we analyze the different outlier definitions as described in bibliography together with the major algorithms and techniques that exist until today. We analyze the characteristics and the basic architect of a NIDS focusing on the state of the art system for each category SNORT and MINDS. At the end we contact an experiment with a small subset of the KDD’99 data set with the help of WEKA and the LOF, in order to highlight the importance of the measure, attribute and data object selection and their role to the final quality of the results. At the end, we presented the challenges, that the ideal solution will be a combination of the two major NIDS categories, the old data sets that are used in the experiments which are unable to describe the contemporary characteristics of the network traffic, the issues that are occurring due to the constant increase of the networks, and we forecast that future research will needed in specific directions of the network intrusion detection, for example towards cloud data, wireless data etc.en
dc.format.extent57en
dc.format.extent2110657 bytes-
dc.format.extent20502054 bytes-
dc.format.extent529136 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/winzip-
dc.format.mimetypeapplication/pdf-
dc.language.isoenen
dc.publisherΠανεπιστήμιο Μακεδονίαςel
dc.subjectNDISen
dc.subjectIntrusion detection systemsen
dc.subjectData miningen
dc.subjectComputer networksen
dc.subjectNetwork securityen
dc.subjectWEKAen
dc.subjectOutlier detectionen
dc.subjectSNORTen
dc.subjectMINDSen
dc.titleData mining in computer network data : intrusion detection systems.en
dc.typeElectronic Thesis or Dissertationen
dc.typeTexten
dc.contributor.departmentΔιατμηματικό Πρόγραμμα Μεταπτυχιακών Σπουδών στα Πληροφοριακά Συστήματαel
Appears in Collections:ΔΠΜΣ Πληροφοριακά Συστήματα (M)

Files in This Item:
File Description SizeFormat 
KatsavelisZisisMsc2014present.pdfΠαρουσίαση490.83 kBAdobe PDFView/Open
KatsavelisZisisMsc2014extra.zipΣυνοδευτικό υλικό20.02 MBzipView/Open
KatsavelisZisisMsc2014.pdf1.99 MBAdobe PDFView/Open


Items in Psepheda are protected by copyright, with all rights reserved, unless otherwise indicated.