Please use this identifier to cite or link to this item:
http://dspace.lib.uom.gr/handle/2159/16513
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Ευαγγελίδης, Γεώργιος | el |
dc.contributor.advisor | Evagelidis, George | en |
dc.contributor.author | Κατσαβέλης, Ζήσης | el |
dc.contributor.author | Katsavelis Zisis | en |
dc.date.accessioned | 2014-11-05T12:54:04Z | - |
dc.date.available | 2014-11-05T12:54:04Z | - |
dc.date.issued | 2014 | el |
dc.identifier.uri | http://dspace.lib.uom.gr/handle/2159/16513 | - |
dc.description | Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014. | el |
dc.description.abstract | In this paper we outline the basic points of the fast growing field of data mining (or as it also known knowledge discovery from data) emphasizing on one critical subdomain known as outlier detection or anomaly detection. We examine this particular area under the prospective of the computer networks security. Anomaly detection is the identification of rare, abnormal observations which contain valuable information, and for that reason they are the main objects of interest in the specific problem domain. At the first parts we analyze the different outlier definitions as described in bibliography together with the major algorithms and techniques that exist until today. We analyze the characteristics and the basic architect of a NIDS focusing on the state of the art system for each category SNORT and MINDS. At the end we contact an experiment with a small subset of the KDD’99 data set with the help of WEKA and the LOF, in order to highlight the importance of the measure, attribute and data object selection and their role to the final quality of the results. At the end, we presented the challenges, that the ideal solution will be a combination of the two major NIDS categories, the old data sets that are used in the experiments which are unable to describe the contemporary characteristics of the network traffic, the issues that are occurring due to the constant increase of the networks, and we forecast that future research will needed in specific directions of the network intrusion detection, for example towards cloud data, wireless data etc. | en |
dc.format.extent | 57 | en |
dc.format.extent | 2110657 bytes | - |
dc.format.extent | 20502054 bytes | - |
dc.format.extent | 529136 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/winzip | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | en |
dc.publisher | Πανεπιστήμιο Μακεδονίας | el |
dc.subject | NDIS | en |
dc.subject | Intrusion detection systems | en |
dc.subject | Data mining | en |
dc.subject | Computer networks | en |
dc.subject | Network security | en |
dc.subject | WEKA | en |
dc.subject | Outlier detection | en |
dc.subject | SNORT | en |
dc.subject | MINDS | en |
dc.title | Data mining in computer network data : intrusion detection systems. | en |
dc.type | Electronic Thesis or Dissertation | en |
dc.type | Text | en |
dc.contributor.department | Διατμηματικό Πρόγραμμα Μεταπτυχιακών Σπουδών στα Πληροφοριακά Συστήματα | el |
Appears in Collections: | ΔΠΜΣ Πληροφοριακά Συστήματα (M) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
KatsavelisZisisMsc2014present.pdf | Παρουσίαση | 490.83 kB | Adobe PDF | View/Open |
KatsavelisZisisMsc2014extra.zip | Συνοδευτικό υλικό | 20.02 MB | zip | View/Open |
KatsavelisZisisMsc2014.pdf | 1.99 MB | Adobe PDF | View/Open |
Items in Psepheda are protected by copyright, with all rights reserved, unless otherwise indicated.