{"created":"2020-09-01T14:22:19.256945+00:00","id":4229,"links":{},"metadata":{"_buckets":{"deposit":"41af1faa-061c-4afa-8d5a-d2bf1fece454"},"_deposit":{"id":"4229","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4229"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4229","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Analyzing Denial-of-service Attacks in KDD CUP 99 Data Set for Intrusion Detection System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Recently cyber security has emerged as anestablished discipline for computer systems andinfrastructures with a focus on protection ofvaluable information stored on those systems fromadversaries who want to obtain, corrupt, damage,destroy or prohibit access to it. One of the securitythreatwhich is difficult to address using traditionalnetwork security techniques is Denial of Service(DoS) attacks. We have seen increasing numbers ofdenial of service (DoS) attacks against onlineservices and web applications either for extortionreasons, or for impairing and even disabling thecompetition. This paper implemented that how muchthese (DoS) attacks stand on a top role above on theother attacks. We evaluate those results on fourattack categories as found in the KDD Cup 99intrusion detection datasets, which is widely usedas one of the publicly available data sets fornetwork-based anomaly detection system such asIntrusion Detection System (IDS)."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-06"}],"displaytype":"preview","filename":"59029.pdf","filesize":[{"value":"126 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4229/files/59029.pdf"},"version_id":"1e5d1dbc-d62e-42fb-b99d-2a85c41d5b35"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khaing, Kyaw Thet"},{"subitem_authors_fullname":"Naing, Thinn"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1920"},"item_title":"Analyzing Denial-of-service Attacks in KDD CUP 99 Data Set for Intrusion Detection System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-06","publish_status":"0","recid":"4229","relation_version_is_last":true,"title":["Analyzing Denial-of-service Attacks in KDD CUP 99 Data Set for Intrusion Detection System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:08:56.774956+00:00"}