To identify suspicious activity in anomaly detection based on soft computing

The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...

Descrizione completa

Dettagli Bibliografici
Autori principali: Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat
Natura: Conference or Workshop Item
Pubblicazione: 2006
Soggetti: