Main Page
About FCIT
History
Strategy
Administration>
Current Administration
Prevouis Administration
Organization Strucutre
Industrial Advisory Board
PhotoAlbum
Lab Guides
Departments
Computer Science
Information Technology
Information Systems
Academics
Bachelor Programs
Graduate Programs
Executive Programs
Academic Calendar
Admission
Bachelor Degree & Transferring
Admission from the Foundation Year
Transferring to the Faculty
Graduate Studies
Graduate Programs
Executive Programs
Scientific Research
Groups and Units
Research Groups
Research Interests
Distinguished Scientists Program
Faculty Journal
Faculty and Staff
Faculty
CS Department
IT Department
IS Department
Staff
Accreditation Integration & Management System (AIM
Development and Quality Unit
Work at FCIT
Capabilities Under the Spotlight
Code of Ethics
Students
Bachelor
ِAcademic Services
Preparatory Year Courses
Students' Guide
Academic Advising
Laboratories and Facilities
Student rights and duties
Graduate
Polices and Regulations
Students' Guide
Student's Handbook
New Student Orientation
Templates of proposals and theses for masters and
Courses
CS Program
IT Program
IS Program
Alumni Registration
Students Activities
Entrepreneurship Club
Cybersecurity Club
Data Science Club
Programming Club
Community
Industrial partnerships
Cisco Academy
Microsoft Academy
Oracle Academy
Files
Researches
Contact Us
عربي
English
About
Admission
Academic
Research and Innovations
University Life
E-Services
Search
Faculty of Computing and Information Technology
Document Details
Document Type
:
Article In Conference
Document Title
:
High Performance Data Mining for Network Intrusion Detection
ارتفاع التعدين بيانات الأداء لكشف التسلل الشبكة
Subject
:
High performance computing, data mining,
Document Language
:
English
Abstract
:
Computer intrusion detection is an approach to detect suspected intrusions as soon as possible to reduce the damage to the system and take appropriate actions using the audit data generated by the computers. There are two basic approaches, anomaly detection and misuse detection. Anomaly detection is to define correct behavior of the system, and then to detect abnormal behaviors. Misuse detection is to characterize known intrusion patterns and generate explicit rules to describe them. Then, it monitors for those patterns to indicate an occurrence of intrusion. However, these algorithms are computationally expensive and the audit data are usually too huge to be processed manually or find valuable information heuristically. We use a high performance data mining technique to discover underlying hidden knowledge embedded in large volumes of data. We develop a parallel data mining model for intrusion detection using a parallel backpropagation neural network. We evaluate the performance of the developed model in terms of speedup, prediction rate, and false alarm rate. We also introduce the concurrent programming library we have been developing called Computational Resiliency library (CRlib) to implement the proposed high performance data mining algorithms.
Conference Name
:
Parallel and Distributed Computing and Systems
Duration
:
From : 9/11/1426 AH - To : 11/11/1426 AH
From : 9/11/2004 AD - To : 11/11/2004 AD
Publishing Year
:
1426 AH
2004 AD
Article Type
:
Article
Conference Place
:
Cambridge, Massachusetts, USA
Organizing Body
:
MIT
Added Date
:
Wednesday, February 16, 2011
Researchers
Researcher Name (Arabic)
Researcher Name (English)
Researcher Type
Dr Grade
Email
معظم صديقي
Siddiqui, Muazzam
Researcher
Doctorate
maasiddiqui@kau.edu.sa
Files
File Name
Type
Description
29008.docx
docx
Back To Researches Page