Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalies manifest in changes in the intensity of network events. Because of the ability of EWMA control chart to monitor the rate of occurrences of events based on their intensity, this statistic is appropriate for implementation in control limits based algorithms. The performance of standard EWMA algorithm can be made more effective combining the logic of adaptive threshold algorithm and adequate application of fuzzy theory. This paper analyzes the theoretical possibility of applying EWMA statistics and fuzzy logic to detect network anomalies. Different aspects of fuzzy rules are discussed as well as different membership functions, trying to find t...
The Internet and computer networks are exposed to an increasing number of security threats With new...
Resiliency and security in critical infrastructure control systems in the modern world of cyber terr...
Abstract — This paper describes the generation of fuzzy signatures to detect some cyber attacks. Thi...
Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalie...
Anomaly based Intrusion detection systems have proved their worth by detecting zero age intrusions b...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
The main aim in network anomaly detection is effectively spotting hostile events within the traffic ...
As computer networks and distributed applications more complex, diverse and intelligent, network beh...
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern clas...
It is difficult to implement an efficient detection approach for Intrusion Detection Systems (IDS) a...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
The planned large scale deployment of smart grid network devices will generate a large amount of inf...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
The Internet and computer networks are exposed to an increasing number of security threats With new...
Resiliency and security in critical infrastructure control systems in the modern world of cyber terr...
Abstract — This paper describes the generation of fuzzy signatures to detect some cyber attacks. Thi...
Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalie...
Anomaly based Intrusion detection systems have proved their worth by detecting zero age intrusions b...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
The main aim in network anomaly detection is effectively spotting hostile events within the traffic ...
As computer networks and distributed applications more complex, diverse and intelligent, network beh...
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern clas...
It is difficult to implement an efficient detection approach for Intrusion Detection Systems (IDS) a...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
The planned large scale deployment of smart grid network devices will generate a large amount of inf...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
The Internet and computer networks are exposed to an increasing number of security threats With new...
Resiliency and security in critical infrastructure control systems in the modern world of cyber terr...
Abstract — This paper describes the generation of fuzzy signatures to detect some cyber attacks. Thi...