<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-01T11:12:07Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/3113" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/3113</identifier>
        <datestamp>2021-12-13T05:46:30Z</datestamp>
        <setSpec>1582963413512:1596119372420</setSpec>
        <setSpec>user-ytu</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Intrusion Detection System Based on Frequent Pattern Mining</dc:title>
          <dc:creator>Myo Min Than</dc:creator>
          <dc:creator>Nyein Nyein Oo</dc:creator>
          <dc:creator>Myo Min Than</dc:creator>
          <dc:description>&lt;p&gt;&amp;nbsp;Due&amp;nbsp; to&amp;nbsp; the&amp;nbsp; dramatically&amp;nbsp; increment&amp;nbsp; of&amp;nbsp; internet&lt;br&gt;
usage,&amp;nbsp; users&amp;nbsp; are&amp;nbsp; facing&amp;nbsp; various&amp;nbsp; attacks&amp;nbsp; day&amp;nbsp; by&amp;nbsp; day.&lt;br&gt;
Consequently, the research area for intrusion detection must&lt;br&gt;
be&amp;nbsp; fresh&amp;nbsp; with&amp;nbsp; new&amp;nbsp; challenges.&amp;nbsp; Intrusion&amp;nbsp; detection&amp;nbsp; system&lt;br&gt;
includes identifying a set of malicious actions that compromise&lt;br&gt;
the&amp;nbsp; integrity,&amp;nbsp; confidentiality,&amp;nbsp; and&amp;nbsp; availability&amp;nbsp; of&amp;nbsp; information&lt;br&gt;
resources.&amp;nbsp; The&amp;nbsp; major&amp;nbsp; contribution&amp;nbsp; is&amp;nbsp; to&amp;nbsp; apply&amp;nbsp; data&amp;nbsp; mining&lt;br&gt;
approach for network intrusion detection system. Among the&lt;br&gt;
several features of data&amp;nbsp; mining, association rules&amp;nbsp; mining,FP-&lt;br&gt;
growth algorithm, is used to find out the frequent itemsets of&lt;br&gt;
incoming packets database. Based on these itemsets, anomaly&lt;br&gt;
detection&amp;nbsp; is&amp;nbsp; added.&amp;nbsp; The&amp;nbsp; system&amp;nbsp; will&amp;nbsp; predict&amp;nbsp; whether&amp;nbsp; the&lt;br&gt;
incoming data packet is normal or attack. The performance of&lt;br&gt;
proposed system is tested by using KDD-99 datasets.&lt;/p&gt;</dc:description>
          <dc:date>2014-12-29</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000003113</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/3113</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
