To identify suspicious activity in anomaly detection based on soft computing

The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...

Full description

Bibliographic Details
Main Authors: Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat
Format: Conference or Workshop Item
Published: 2006
Subjects: