Intrusion detection systems using K-means clustering system

Nor Dzuhairah Hani, Jamaludin (2019) Intrusion detection systems using K-means clustering system. Faculty of Computer System & Software Engineering, Universiti Malaysia Pahang.

[img]
Preview
Pdf
Intrusion detection systems using K-means clustering.pdf - Accepted Version

Download (816kB) | Preview

Abstract

Internet is the biggest platform for people all over the world to connect with each other, and to search for important information and such. Along with the raising of internet usage, the number of cases of intrusion attacks also increases. Because of this, intrusion detection is important, especially for large companies which held huge and confidential data and information. This system works to detect the abnormal connection of a network so that a stronger protection could be build. Since the attack is not restricted into only one type, a data mining technique is applied to classify all types of attack from a huge amount of data entering into a network. By using this technique, the intrusion detection system could work better. In this research, data mining technique of K-means clustering system are used to detect the intrusion and attack. 1999 KDD Cup Dataset is used for training, testing, and validation of the system. The dataset is famous among intrusion detection system researcher for its data which resembles real attacks at real times.

Item Type: Undergraduates Project Papers
Additional Information: Project Paper (Bachelors of Computer Science (Software Engineering)) -- Universiti Malaysia Pahang – 2019, SV: ENCIK MOHD HAFIZ BIN MOHD HASSIN, e-Thesis
Uncontrolled Keywords: Intrusion attacks; intrusion detection; data mining
Subjects: Q Science > QA Mathematics > QA76 Computer software
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: Mrs. Sufarini Mohd Sudin
Date Deposited: 27 Nov 2019 08:39
Last Modified: 27 Nov 2019 08:39
URI: http://umpir.ump.edu.my/id/eprint/26636
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item