Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/39366
Title: | ระบบวิเคราะห์การบุกรุกเครือข่ายของข้อมูลจราจรทางคอมพิวเตอร์โดยใช้ทฤษฎีต้นไม้การตัดสินใจ |
Other Titles: | Network Intrusion Analysis System of Computer Traffic Data Using Decision Tree Theory |
Authors: | ศักดิ์นริน อินทะจักร์ |
Authors: | รองศาสตราจารย์ ดร.เอกรัฐ บุญเชียง ศักดิ์นริน อินทะจักร์ |
Issue Date: | Jul-2558 |
Publisher: | เชียงใหม่ : บัณฑิตวิทยาลัย มหาวิทยาลัยเชียงใหม่ |
Abstract: | This independent study was about computer network systems related to the laws regarding computer-related crime. All sectors collected computer traffic data as evidence for network usability. This independent study made use of computer traffic data by analyzing data to search for the intruders and threats occurring in the system by using decision tree. Computer traffic data for learning was used as the model which was analyzed by the decision tree. Then, the decision tree was built. When the equipment transferred traffic data into the system, it determind if the data were intruders or threats. If intruders were found, the system kept data for building the decision tree and learning data were continually collected. The system had faster verification and better prediction of intruders and threats according to the data sent by the equipment. The results of the study were consistent with the objectives and scope of the research. The results were summarized into a graph. It was found that when the system had additional learning and the node of the decision tree was adjusted, less time was taken to detect intruders or threats along with increasing efficiency. |
URI: | http://repository.cmu.ac.th/handle/6653943832/39366 |
Appears in Collections: | SCIENCE: Independent Study (IS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Adstract.docx | Abstract (words) | 172.94 kB | Microsoft Word XML | View/Open Request a copy |
ABSTRACT.pdf | Abstract | 187.2 kB | Adobe PDF | View/Open |
FULL.pdf | Full IS | 4.62 MB | Adobe PDF | View/Open Request a copy |
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.