BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Computer Engineering Department - ECPv5.8.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Computer Engineering Department
X-ORIGINAL-URL:https://engineering.tiu.edu.iq/computer
X-WR-CALDESC:Events for Computer Engineering Department
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20160101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20161204T153000
DTEND;TZID=UTC:20161204T160000
DTSTAMP:20210826T111800
CREATED:20161201T101745Z
LAST-MODIFIED:20161201T103506Z
UID:578-1480865400-1480867200@engineering.tiu.edu.iq
SUMMARY:Evaluation Effectiveness of Hybrid IDS Using Snort with Naïve Bayes to Detect Attacks
DESCRIPTION:Abstract: The enormous number of attacks over the Internet nowadays makes the information under potential violation. Intrusion Detection System (IDS) is used as second line of defense to observe suspicious actions going on in computers or network devices. IDS have two approaches by using only one of the approaches only one of the misuse or anomaly attacks can be detected. This research proposed hybrid IDS by integrated signature based (Snort) with anomaly based (Naive Bayes) to enhance system security to detect attacks. This research used Knowledge Discovery Data Mining (KDD) CUP 99 dataset and Waikato Environment for Knowledge Analysis (WEKA)\nprogram for testing the proposed hybrid IDS. Accuracy\, detection rate\, time to build model and false alarm rate were used as parameters to evaluate performance between hybrid Snort with Naïve Bayes\, Snort with J48graft and Snort with Bayes Net. The result shows good performance of using hybrid Snort with\nNaive Bayes algorithm. \n\n\n	Related
URL:https://engineering.tiu.edu.iq/computer/event/internal-seminar/
LOCATION:Room Number 212\, Tishk International  University 
END:VEVENT
END:VCALENDAR