Title : AI Techniques Applied To Intrusion Detection System

Type of Material: Thesis
Title: AI Techniques Applied To Intrusion Detection System
Researcher: Parameswar, D
Guide: Khanaa, V
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2021
Language: English
Subject: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2021; D15CS518
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454993
003IN-AhILN
0052024-09-20 15:10:21
008__240920t2021||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454993
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aParameswar, D|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aAI Techniques Applied To Intrusion Detection System
260__|aChennai|bBharath University, Chennai|c2021
300__|dDVD
502__|bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2021|oD15CS518
520__|aNetwork Intrusion Detection is an important tool to detect and analyze security threats to a communication network. It complements other network security techniques, such as firewalls, by providing information about the frequency and nature of attacks. A network intrusion detection system (NIDS) often consists of a sensor that analyzes every packet on the network under observation, and forwards the packets which are deemed interesting, together with an alert message to a backend system, that stores them for further analysis and correlation with other events. This research work has been designed and executed in three phases, namely, protocol structure standardization, generation of cross over and mutation values for device identification using the genetic approach and the modified J48 decision tree algorithm for search process. The performance of the developed algorithms/methods is compared with the existing methods, and found to be good. In the first phase, the 64 byte structured protocol standardization te
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aComputer Science
653__|aComputer Science Artificial Intelligence
653__|aEngineering and Technology
700__|aKhanaa, V|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/354889|yShodhganga
905__|afromsg

User Feedback Comes Under This section.