語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Evaluation of Unsupervised Learning ...
~
Dang, Binh Hy.
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
作者:
Dang, Binh Hy.
面頁冊數:
237 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-09(E), Section: B.
附註:
Adviser: Wei Li.
Contained By:
Dissertation Abstracts International75-09B(E).
標題:
Computer science.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3623136
ISBN:
9781303954436
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
Dang, Binh Hy.
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
- 237 p.
Source: Dissertation Abstracts International, Volume: 75-09(E), Section: B.
Thesis (Ph.D.)--Nova Southeastern University, 2014.
This item must not be sold to any third party vendors.
Anomaly detection in mobile ad hoc network (MANET) is a relatively new area of research. The lack of fixed infrastructure, limited resources, and dynamic topology present numerous problems in MANET security. Recently, several machine learning and data mining techniques have been proposed for anomaly detection in MANETs. In addition, researchers continue to examine new unsupervised detection techniques. As the number of unsupervised learning techniques grows, there is a lack of evidence to support the use of one technique over another.
ISBN: 9781303954436Subjects--Topical Terms:
199325
Computer science.
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
LDR
:03468nmm a2200301 4500
001
457661
005
20150805065216.5
008
150916s2014 ||||||||||||||||| ||eng d
020
$a
9781303954436
035
$a
(MiAaPQ)AAI3623136
035
$a
AAI3623136
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Dang, Binh Hy.
$3
708659
245
1 0
$a
Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
300
$a
237 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-09(E), Section: B.
500
$a
Adviser: Wei Li.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2014.
506
$a
This item must not be sold to any third party vendors.
520
$a
Anomaly detection in mobile ad hoc network (MANET) is a relatively new area of research. The lack of fixed infrastructure, limited resources, and dynamic topology present numerous problems in MANET security. Recently, several machine learning and data mining techniques have been proposed for anomaly detection in MANETs. In addition, researchers continue to examine new unsupervised detection techniques. As the number of unsupervised learning techniques grows, there is a lack of evidence to support the use of one technique over another.
520
$a
This dissertation research conducted a set of experiments to evaluate the effectiveness of different unsupervised learning techniques for anomaly detection in MANETs, more specifically, the K-means, the C-means, the Fixed-width clustering, the Principal Component Analysis, and the One-class Support Vector Machine. While the main goal of the research was to compare performance of the unsupervised learning techniques, this dissertation research also investigated: i) tradeoffs between competing factors such as high detection performance and limited resource utilization, ii) the impact of normal profile selection models on anomaly detection, iii) the influence of the link change rate as the weighting function on the unsupervised learning algorithms and iv) the influence of decision thresholds on the detection techniques.
520
$a
The results of this dissertation research showed that both K-means and C-means delivered the best performance when using different normal profile models. The results indicated that direct application of clustering techniques provided a worse average performance than that of trained clusters. This dissertation research found that a small value for the time slot was preferred for all techniques. Moreover, a short training interval was also preferred. These preferences appeared to provide better performance while minimizing resource usage (e.g. execution time, CPU, and memory usages). Additionally, the method of using only the initial training data set was found to provide a comparable performance to that of random, recent, and adaptive normal profile models, but required the least resource usage. Finally, the study found that the application of link change rate as the weighting function to adjust the importance of the time slot had no influence on all techniques. Choosing appropriate parameter and decision thresholds for each detection algorithm had a significant influence on maximizing the performance results.
590
$a
School code: 1191.
650
4
$a
Computer science.
$3
199325
690
$a
0984
710
2
$a
Nova Southeastern University.
$b
Computer Science.
$3
708660
773
0
$t
Dissertation Abstracts International
$g
75-09B(E).
790
$a
1191
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3623136
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000108600
電子館藏
1圖書
學位論文
TH 2014
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3623136
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入