ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ
dc.contributor.author | Жечева, Веселина | |
dc.contributor.author | Николова, Евгения | |
dc.date.accessioned | 2025-02-23T11:43:55Z | |
dc.date.issued | 2016 | |
dc.description.abstract | The purpose of the intrusion detection systems (IDS) is to reveal any violence of the organizations’ security policy – unauthorized access from outsiders, rising privileges of authorized users, violation of the confidentiality and/or integrity of system resources. The present paper presents an examination of the current IDS, based on the anomalies (behavioral analysis), where C4.5 algorithm is applied in a host-based scenario in order to describe the normal user activity, using decision tree. As a second step, a cluster analysis has been applied with purpose to classify current user activity as normal or malicious. With purpose of approving the proposed methodology, a number of simulation experiments have been applied and the obtained results have been analyzed. | |
dc.identifier.issn | 1314-7846 | |
dc.identifier.uri | http://research.bfu.bg:4000/handle/123456789/202 | |
dc.language.iso | bg | |
dc.publisher | Бургаски свободен университет | |
dc.relation.ispartofseries | Т. 5 Бр. 4 | |
dc.subject | Intrusion detection systems (IDS) | |
dc.subject | anomaly-based IDS | |
dc.subject | C4.5 algorithm | |
dc.subject | decision tree | |
dc.subject | cluster analysis | |
dc.title | ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ | |
dc.title.alternative | DECISION TREE APPLICATION TO INTRUSION DETECTION SYSTEMS | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 2. ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ.pdf
- Size:
- 587.6 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: