0% found this document useful (0 votes)
29 views4 pages

CommentsUpdatePage TempleteV2

The document summarizes a student's proposal defense and review comments report for their master's thesis. It includes the student's name, thesis title, a table with comments and feedback from reviewers on different aspects of the proposal along with the student's responses and updates made.

Uploaded by

Fitawu Tekola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

CommentsUpdatePage TempleteV2

The document summarizes a student's proposal defense and review comments report for their master's thesis. It includes the student's name, thesis title, a table with comments and feedback from reviewers on different aspects of the proposal along with the student's responses and updates made.

Uploaded by

Fitawu Tekola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

TECHNICAL VOCATIONAL TRAINING INSTITUTE (TVTI)

DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY(ICT)


M.Sc. 2nd Year First Semester 2021-2022 (2014)
Proposal defense and review comments Report

I
TECHNICAL VOCATIONAL TRAINING INSTITUTE (TVTI)
DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY(ICT)
M.Sc. 2nd Year First Semester 2021-2022 (2014)
Proposal defense and review comments Report

II
TECHNICAL VOCATIONAL TRAINING INSTITUTE (TVTI)
DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY(ICT)
M.Sc. 2nd Year First Semester 2021-2022 (2014)
Proposal defense and review comments Report

Name: <Fitawu Tekola Mekuria>

Title: <Improve Intrusion detection model using machine learning: the case of
Ethiopian WoredaNet network>

N Proposal Defense Comment Updates/Corrections you made Page


o no

1 Problem statement general With the rapid growth of the Internet and the
problem,not related to case area
ever-increasing security problems associated
with its popularity, the need for protection
3
against unwanted intruders has become very
important So intrusion detection system
widely applied in different organization.

 By using unauthorized access, hackers


and intruders can create many successful
attempts to cause the crash of the
networks and web services by
unauthorized intrusion

 Legitimate users are unable to access


information systems, devices, or other
network resources due to the actions of a
malicious cyber threat actor

 Termination of misuse and denial of the


service problems Some of the reasons are
the absence of proper, continual, and
consistent security mechanisms, which
leads the attacks and threats to occur.

III
TECHNICAL VOCATIONAL TRAINING INSTITUTE (TVTI)
DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY(ICT)
M.Sc. 2nd Year First Semester 2021-2022 (2014)
Proposal defense and review comments Report

2 Propose solution need The Selected Model implementation has the


modification

22_23

3 Sample attribute not mentioned The dataset


following is checked for the consistency of
steps:
individual attribute values and types, quantity
18
and missing values, using WEKA
prepossessing panel and Microsoft excel.

Local Examiner Name& Signature: _________________________ _________________

Expatriate Examiner Name& Signature: Dr Vikrant

Name of the Advisor: _________________________________ ________________

IV

You might also like