World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection

By Bridges, Susan M., Dr.

Click here to view

Book Id: WPLBN0000659190
Format Type: PDF eBook
File Size: 113.19 KB.
Reproduction Date: 2005
Full Text

Title: Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection  
Author: Bridges, Susan M., Dr.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collection: Techonology eBook Collection
Subcollection:
Historic
Publication Date:
Publisher:

Description
Technical Reference Publication

Excerpt
Introduction: The wide spread use of computer networks in today?s society, especially the sudden surge in importance of e-commerce to the world economy, has made computer network security an international priority. Since it is not technically feasible to build a system with no vulnerabilities, intrusion detection has become an important area of research. Intrusion detection approaches are commonly divided into two categories: misuse detection and anomaly detection [1]. The misuse detection approach attempts to recognize attacks that follow intrusion patterns that have been recognized and reported by experts. Misuse detection systems are vulnerable to intruders who use new patterns of behavior or who mask their illegal behavior to deceive the detection system. Anomaly detection methods were developed to counter this problem. With the anomaly detection approach, one represents patterns of normal behavior, with the assumption that an intrusion can be identified based on some deviation from this normal behavior.

Table of Contents
Conference Committee.........................................................................................................................i Table of Contents.................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University

 

Click To View

Additional Books


  • What I Saw in the Tropics; A Record of V... (by )
  • Fuzzy Data Mining and Genetic Algorithms... (by )
  • The Cuckoo's Nest (by )
  • Safe and Healthy Living : [Growing Big a... (by )
  • The Republic of Costa Rica (by )
  • Usaids Obligations in Water Resources Ma... (by )
  • Efficient Boiler Management : With Notes... (by )
  • The Kama Sutra of Vatsayayana (by )
  • Iron and Steel Castings : 2002 (by )
  • A Practical Treatise on Casting and Foun... (by )
  • Nhanes 2001–2002 Data Documentation Dece... (by )
  • Histoire des Kosaques, Prcde D'Une Intro... Volume Vol 1 (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.