Advanced search

Found 2 essays matching the above criteria.

  1. 1. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Resmi Adiyodi Madhavan; Ann Zenna Sajan; [2022]
    Keywords : Malicious Activity Detection; Cloud Computing; Network Traffic; Fully Homomorphic Encryption FHE ; Machine Learning; Random Forest RF ; Logistic Regession LR ;

    Abstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE

  2. 2. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rebecca Petersen; [2015]
    Keywords : Data mining; machine learning; cyber-attack; NSL-KDD; fea-tures; DoS; Probing; R2L; U2R.;

    Abstract : Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. READ MORE