To identify suspicious activity in anomaly detection based on soft computing
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2006
|
Subjects: |