Details

Analysis of time-based approach for detecting anomalous network traffic /

by Khasgiwala, Jitesh.

Abstract (Summary)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.1 Intrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . 12 1.2 Organization of Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.1 Classification of Intrusion Detection Systems . . . . . . . . . . . . . . 16 2.1.1 Classification Based on the Location of Source . . . . . . . . . 16 2.1.2 Classification Based on the Method of Detection . . . . . . . . 17 2.2
Bibliographical Information:

Advisor:

School:Ohio University

School Location:USA - Ohio

Source Type:Master's Thesis

Keywords:heuristic programming computer networks algorithms

ISBN:

Date of Publication:

© 2009 OpenThesis.org. All Rights Reserved.