Partial fulfillment for award of the degree of Master of Science in Information Technology.Intrusion detection systems are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. A major concern of existing anomaly intrusion detection approaches is that they tend to produce excessive false alarms. One reason for this is that the normal and abnormal behaviour of a monitored object can overlap or be very close to each other which makes it difficult to define a clear boundary between the two. This thesis presents a fuzzy logic model for misuse and access intrusion detection where instead of using crisp conditions, or fixed thresholds, fuzzy sets are us...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained impo...
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
Abstract- Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system se...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to In...
Computer security, and intrusion detection in particular, has become increasingly important in today...
As the network based technologies become omnipresent, demands to secure networks/systems against thr...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained impo...
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
Abstract- Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system se...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to In...
Computer security, and intrusion detection in particular, has become increasingly important in today...
As the network based technologies become omnipresent, demands to secure networks/systems against thr...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained impo...