ПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ

dc.contributor.authorЖечева, Веселина
dc.contributor.authorНиколова, Евгения
dc.date.accessioned2025-05-22T13:49:48Z
dc.date.issued2016
dc.description.abstractThe purpose of the intrusion detection systems (IDS) is to reveal any violence of the organizations’ security policy – unauthorized access from outsiders, rising privileges of authorized users, violation of the confidentiality and/or integrity of system resources. The present paper presents an examination of the current IDS, based on the anomalies (behavioral analysis), where C4.5 algorithm is applied in a host-based scenario in order to describe the normal user activity, using decision tree. As a second step, a cluster analysis has been applied with purpose to classify current user activity as normal or malicious. With purpose of approving the proposed methodology, a number of simulation experiments have been applied and the obtained results have been analyzed.
dc.identifier.isbn978-619-7126-28-0
dc.identifier.urihttp://research.bfu.bg:4000/handle/123456789/2651
dc.language.isoother
dc.publisherБургаски Свободен Университет
dc.relation.ispartofseries2016
dc.subjectIntrusion detection systems (IDS)
dc.subjectanomaly-based IDS
dc.subjectC4.5 algorithm
dc.subjectdecision tree
dc.subjectcluster analysis
dc.titleПРИЛОЖЕНИЕ НА ДЪРВО НА РЕШЕНИЯТА В СИСТЕМИТЕ ЗА ОТКРИВАНЕ НА НАРУШЕНИЯ
dc.title.alternativeDECISION TREE APPLICATION TO INTRUSION DETECTION SYSTEMS
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
506_512-2016. Научна конференция с международно участие Новата идея в образованието. Том 2.pdf
Size:
429.33 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: