{"created":"2020-08-30T13:55:59.294612+00:00","id":3113,"links":{},"metadata":{"_buckets":{"deposit":"dbb7a1f5-b026-49ef-b5b8-9499b3d9def8"},"_deposit":{"id":"3113","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3113"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3113","sets":["1582963413512:1596119372420"]},"communities":["ytu"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Intrusion Detection System Based on Frequent Pattern Mining","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"<p>&nbsp;Due&nbsp; to&nbsp; the&nbsp; dramatically&nbsp; increment&nbsp; of&nbsp; internet<br>\nusage,&nbsp; users&nbsp; are&nbsp; facing&nbsp; various&nbsp; attacks&nbsp; day&nbsp; by&nbsp; day.<br>\nConsequently, the research area for intrusion detection must<br>\nbe&nbsp; fresh&nbsp; with&nbsp; new&nbsp; challenges.&nbsp; Intrusion&nbsp; detection&nbsp; system<br>\nincludes identifying a set of malicious actions that compromise<br>\nthe&nbsp; integrity,&nbsp; confidentiality,&nbsp; and&nbsp; availability&nbsp; of&nbsp; information<br>\nresources.&nbsp; The&nbsp; major&nbsp; contribution&nbsp; is&nbsp; to&nbsp; apply&nbsp; data&nbsp; mining<br>\napproach for network intrusion detection system. Among the<br>\nseveral features of data&nbsp; mining, association rules&nbsp; mining,FP-<br>\ngrowth algorithm, is used to find out the frequent itemsets of<br>\nincoming packets database. Based on these itemsets, anomaly<br>\ndetection&nbsp; is&nbsp; added.&nbsp; The&nbsp; system&nbsp; will&nbsp; predict&nbsp; whether&nbsp; the<br>\nincoming data packet is normal or attack. The performance of<br>\nproposed system is tested by using KDD-99 datasets.</p>"}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"intrusion detection"},{"interim":"data mining"},{"interim":"anomaly"},{"interim":"algorithm"},{"interim":"KDD-99 datasets"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-04"}],"displaytype":"preview","filename":"Intrusion Detection System Baed on Frequent Pattern Mining.pdf","filesize":[{"value":"386 Kb"}],"format":"application/pdf","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3113/files/Intrusion Detection System Baed on Frequent Pattern Mining.pdf"},"version_id":"a0aaf596-503a-46b7-9bb4-37ee9cce7064"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICSE","subitem_c_date":"29-30 December, 2014","subitem_conference_title":"International Conference on Science and Engineering","subitem_part":"","subitem_place":"Myanmar","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myo Min Than"},{"subitem_authors_fullname":"Nyein Nyein Oo"},{"subitem_authors_fullname":"Myo Min Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2014-12-29"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"10.5281/zenodo.3268384"},"item_title":"Intrusion Detection System Based on Frequent Pattern Mining","item_type_id":"21","owner":"1","path":["1596119372420"],"publish_date":"2019-07-04","publish_status":"0","recid":"3113","relation_version_is_last":true,"title":["Intrusion Detection System Based on Frequent Pattern Mining"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T05:46:30.296456+00:00"}