The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false alarms. In this paper we propose an intrusion detection method that proposes rough set based feature selection heuristics and using fuzzy c-means for clustering data. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy Clustering methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to increase accuracy detection r...
The purpose of the intrusion detection systems is to detect attacks on computer systems and networks...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
Abstract: The traditional intrusion detection systems (IDS) look for unusual or suspicious activity...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
One main drawback of intrusion detection system is the inability of detecting new attacks which do n...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
The purpose of the intrusion detection systems is to detect attacks on computer systems and networks...
The purpose of the intrusion detection systems is to detect attacks on computer systems and networks...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
Abstract: The traditional intrusion detection systems (IDS) look for unusual or suspicious activity...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
One main drawback of intrusion detection system is the inability of detecting new attacks which do n...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
The purpose of the intrusion detection systems is to detect attacks on computer systems and networks...
The purpose of the intrusion detection systems is to detect attacks on computer systems and networks...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...