To identify suspicious activity in anomaly detection based on soft computing

The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...

Mô tả đầy đủ

Chi tiết về thư mục
Những tác giả chính: Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat
Định dạng: Conference or Workshop Item
Được phát hành: 2006
Những chủ đề: