To identify suspicious activity in anomaly detection based on soft computing
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...
Những tác giả chính: | , , , , |
---|---|
Định dạng: | Conference or Workshop Item |
Được phát hành: |
2006
|
Những chủ đề: |