ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ

dc.contributor.authorЖечева, Веселина
dc.contributor.authorНиколова, Евгения
dc.date.accessioned2025-02-23T11:43:55Z
dc.date.issued2016
dc.description.abstractThe purpose of the intrusion detection systems (IDS) is to reveal any violence of the organizations’ security policy – unauthorized access from outsiders, rising privileges of authorized users, violation of the confidentiality and/or integrity of system resources. The present paper presents an examination of the current IDS, based on the anomalies (behavioral analysis), where C4.5 algorithm is applied in a host-based scenario in order to describe the normal user activity, using decision tree. As a second step, a cluster analysis has been applied with purpose to classify current user activity as normal or malicious. With purpose of approving the proposed methodology, a number of simulation experiments have been applied and the obtained results have been analyzed.
dc.identifier.issn1314-7846
dc.identifier.urihttp://research.bfu.bg:4000/handle/123456789/202
dc.language.isobg
dc.publisherБургаски свободен университет
dc.relation.ispartofseriesТ. 5 Бр. 4
dc.subjectIntrusion detection systems (IDS)
dc.subjectanomaly-based IDS
dc.subjectC4.5 algorithm
dc.subjectdecision tree
dc.subjectcluster analysis
dc.titleПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ
dc.title.alternativeDECISION TREE APPLICATION TO INTRUSION DETECTION SYSTEMS
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2. ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ.pdf
Size:
587.6 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: