Intrusion Detection System in a Cloud Network Using K Nearest Neighbour Algorithm
dc.contributor.advisor | Zunayeed Bin Zahir | |
dc.contributor.author | Hasibul Alam Ratul | |
dc.contributor.author | Badiuzzaman Pranto | |
dc.contributor.author | Ishrat Jahan Diya | |
dc.contributor.author | Md. Mahidur Rahman | |
dc.contributor.id | 1520362042 | |
dc.contributor.id | 1512236042 | |
dc.contributor.id | 1510688042 | |
dc.contributor.id | 1510494042 | |
dc.coverage.department | Electrical and Computer Engineering | |
dc.date.accessioned | 2024-06-05 | |
dc.date.accessioned | 2024-06-05T04:55:34Z | |
dc.date.available | 2024-06-05T04:55:34Z | |
dc.date.issued | 2019 | |
dc.description.abstract | In this project, we are going to develop an Intrusion Detection System in a Cloud Network Using K Nearest Neighbour Algorithm which can detect a few number of intrusions and notify the admin as well. An IDS is capable of monitoring all or parts of the dynamic behavior and the state of a computer system, based on how it is configured. Besides such activities as dynamically inspect network packets targeted at this specific host, an IDS might detect which program accesses what resources and discover that, for example, a wordprocessor has suddenly and inexplicably started modifying the system password database. Similarly a HIDS might look at the state of a system, its stored information, whether in RAM, in the file system, log files or elsewhere; and check that the contents of these appear as expected, e.g. have not been changed by intruders. One can think of an IDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system's security policy. | |
dc.description.degree | Undergraduate | |
dc.identifier.cd | 600000088 | |
dc.identifier.print-thesis | To be assigned | |
dc.identifier.uri | https://repository.northsouth.edu/handle/123456789/895 | |
dc.language.iso | en_US | |
dc.publisher | North South University | |
dc.rights | © NSU Library | |
dc.subject | TECHNOLOGY::Electrical engineering, electronics and photonics::Electrical engineering | |
dc.title | Intrusion Detection System in a Cloud Network Using K Nearest Neighbour Algorithm | |
dc.type | Project | |
oaire.citation.endPage | 64 | |
oaire.citation.startPage | 1 |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.93 KB
- Format:
- Item-specific license agreed to upon submission
- Description: