MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "536869a1-3ce1-43e4-a106-1847e3ead594"}, "_deposit": {"id": "4987", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4987"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4987", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Hybrid Intrusion Detection System Design for Advanced Threats", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Due to the increase in the use of internetand rise in number of network attacks, intrusiondetection has become significant research issue.The objective of this work is to propose a hybridintrusion detection system design to solve thesecurity issue of the today advanced threats. Inthis research work, both anomaly and misusedetection systems are used so that not only theattacks that is already known but also new formof threats can be detected. Agent technology isused to implement in this system. Each detectionengine is autonomous and feedback mechanismis provided so that the system will be modified ifnew form of threats is detected. This proposedsystem will give high accuracy in detection rateand reduce the false positive rate."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-356-362.pdf", "filesize": [{"value": "2960 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2960000.0, "url": {"url": "https://meral.edu.mm/record/4987/files/proceeding_total-pages-356-362.pdf"}, "version_id": "a564ed93-3f8b-4adc-ad67-6bb2f58a9bc1"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Htwe, Thet Thet"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/885"}, "item_title": "Hybrid Intrusion Detection System Design for Advanced Threats", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004987", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-15"}, "publish_date": "2019-07-15", "publish_status": "0", "recid": "4987", "relation": {}, "relation_version_is_last": true, "title": ["Hybrid Intrusion Detection System Design for Advanced Threats"], "weko_shared_id": -1}
Hybrid Intrusion Detection System Design for Advanced Threats
http://hdl.handle.net/20.500.12678/0000004987
http://hdl.handle.net/20.500.12678/000000498751a00b87-23f4-41fd-b424-bb99d17a0647
536869a1-3ce1-43e4-a106-1847e3ead594
Name / File | License | Actions |
---|---|---|
proceeding_total-pages-356-362.pdf (2960 Kb)
|
|