Advanced search
Found 2 essays matching the above criteria.
-
1. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE
-
2. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. READ MORE