Dissertation > Excellent graduate degree dissertation topics show

SVM-based semi-supervised network intrusion detection system

Author: LiuJun
Tutor: SunWeiChi
School: Fudan University
Course: Software Engineering
Keywords: Statistical Approach Ontology Methods Svm Clusting
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 82
Quote: 0
Read: Download Dissertation


Network Intrusion has been a frequently discussed issue without a cool solution. A variety of methods are proposed by professionals for intrusion prevention and management, and these methods focus on different aspect in the technique level. The question is how to resist against network intrusion and where to start.In this paper, we base our recently research on text clustering and classification techniques and try to link all the elements in the network together by mining and association, in order to discover logic relevance like "beer and diapers" . We examine and eliminate the network intrusion from a new perspective. We focus on the proposed model and the possible results via this new model. Category clustering analysis is an analytical tool in machine learning, pattern recognition and computer vision. The traditional category clustering is unsupervised, and it is widely used because of its low level of human interaction and little cost. However, the problem with unsupervised learning is that it depends on some assumptions, e.g., the assumption that type distribution is uniform and Eigen-values are equal, which may not be able to resolve new problems we encountered. So this paper takes lot of consideration into the behavior characteristics of its original network intrusion.After all, it is a new information world with globalization, and people are complaining the network intrusion while we are accumulating huge amount of information of intrusion packets, coding, system logs , syslogd and network flows. When such information is used for category clustering analysis, expected results could be obtained under human’ s supervision or interaction.Our system proposed a new perspective for network intrusion detection and prevention. A new criterion is suggested in a macro way to judge between the network behavior and the various network devices.

Related Dissertations

  1. Soft Sensor of Naphtha Dry Point on Support Vector Machines Regression,TE622.1
  2. ISAR Imaging Simulation of Space Targets and Target Recognition Based on ISAR Images,TN957.52
  3. Research on Autamatic Music Structrue Analysis,TN912.3
  4. Research on Feature Extraction and Classification of Pulse Waveform for Cholecystitis and Nephrotic Syndrome Diagnosis,TP391.41
  5. Research on Word Alignment Based on Statistics and Linguistics and Correlation Fusion Strategy,TP391.2
  6. The Research on Paper Currency Classification Method Based on Harr-Like Feature and Minimal Ball Including Samples,TP391.41
  7. Research on Focused Crawler Based on SVM Classification Algorithm,TP391.3
  8. Research on Predicting Intrinsic Disorder Protein Structure Based on Supervision Manifold Learning Algorithm,Q51
  9. Salt-Tolerance Evaluation of Brassica Napus Germplasm in the Bud and Seeding and Establishment of the Two-Dimensional Electrophoresis System,S565.4
  10. The Research on English-Chinese Name Entity Translation,TP391.2
  11. Study on Visual Target Detection Based on SVM,TP391.41
  12. The Research of Key Techniques on Computer-Aided Planning before Liver Transplantation,TP391.41
  13. Research on Relevance Feedback Techniques Based on Long-term Log Learning and RW-Soft SVM in CBIR,TP391.3
  14. Study on Automatic Classification Method for Remotely Sensed Imagery by Incorporating Spatial-Spectral Features,TP751
  15. Exoskeleton system control signal analysis and processing,TN911.7
  16. P2P streaming feature extraction technology research and implementation,TN919.8
  17. Research about the Algorithms of the Remote Image Geometry Correction Based on Support Vector Machines,TP751;O241.5
  18. Research on Coal Mine Gas Exploalon Accldent-Causing Based on the Interpretative Structural Modeling,TD712.7
  19. Research and Practice on Experiments of Electronic Maps,P208
  20. Habitation Extraction and Edge Optimization,P237
  21. The Remote Sensing Monitoring and Assessment of Environment under the Influence of Mining,P237

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile