One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature selection heuristics and using rough fuzzy for clustering data. ICA is to separate these independent components (ICs) from the monitored variables. Rough set has to decrease the amount of data and get rid of redundancy and Fuzzy methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect activity that may be the result of a new, unknown attack. The experimental results on Knowl...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Intrusion Detection Systems are playing major role in network security in this internet world. Many ...
Abstract: The traditional intrusion detection systems (IDS) look for unusual or suspicious activity...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Abstract:- Intrusion detection is the art of detecting unauthorized, inappropriate, or anomalous act...
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Intrusion Detection Systems are playing major role in network security in this internet world. Many ...
Abstract: The traditional intrusion detection systems (IDS) look for unusual or suspicious activity...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Abstract:- Intrusion detection is the art of detecting unauthorized, inappropriate, or anomalous act...
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
The explosive growth of computer networking has brought about limitless possibilities and opportunit...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Intrusion Detection Systems are playing major role in network security in this internet world. Many ...