World Library  


Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection

By Bridges, Susan M., Dr.

Description
Technical Reference Publication

Excerpt
Introduction: The wide spread use of computer networks in today?s society, especially the sudden surge in importance of e-commerce to the world economy, has made computer network security an international priority. Since it is not technically feasible to build a system with no vulnerabilities, intrusion detection has become an important area of research. Intrusion detection approaches are commonly divided into two categories: misuse detection and anomaly detection [1]. The misuse detection approach attempts to recognize attacks that follow intrusion patterns that have been recognized and reported by experts. Misuse detection systems are vulnerable to intruders who use new patterns of behavior or who mask their illegal behavior to deceive the detection system. Anomaly detection methods were developed to counter this problem. With the anomaly detection approach, one represents patterns of normal behavior, with the assumption that an intrusion can be identified based on some deviation from this normal behavior.

Table of Contents
Conference Committee.........................................................................................................................i Table of Contents.................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University

Click here to view

Book Id: WPLBN0000659190
Format Type: PDF eBook
File Size: 113.19 KB.
Reproduction Date: 2005
Full Text


Title: Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection  
Author: Bridges, Susan M., Dr.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collection: Techonology eBook Collection
Subcollection:
Historic
Publication Date:
Publisher:
QR link for Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection
Add to Book Shelf
Flag as Inappropriate
Email this Book
 

Click To View

Other Books I Looked at: Click to view all Books in my History


  • Fuzzy Data Mining and Genetic Algorithms... (by )
    Book Rating (13)
Scroll Left
Scroll Right

Click To View

People also read these books: Click to view all Additional Books


  • What I Saw in the Tropics; A Record of V... (by )
    Book Rating (3)
  • Fuzzy Data Mining and Genetic Algorithms... (by )
    Book Rating (28)
  • The Cuckoo's Nest (by )
    Book Rating (132)
  • Safe and Healthy Living : [Growing Big a... (by )
    Book Rating (1)
  • The Republic of Costa Rica (by )
    Book Rating (3)
  • Usaids Obligations in Water Resources Ma... (by )
    Book Rating (155)
  • Efficient Boiler Management : With Notes... (by )
    Book Rating (4)
  • The Kama Sutra of Vatsayayana (by )
    Book Rating (12)
  • Iron and Steel Castings : 2002 (by )
    Book Rating (132)
  • A Practical Treatise on Casting and Foun... (by )
    Book Rating (155)
  • Nhanes 2001–2002 Data Documentation Dece... (by )
    Book Rating (200)
  • Histoire des Kosaques, Prcde D'Une Intro... Volume Vol 1 (by )
    Book Rating (2)
Scroll Left
Scroll Right

Click To View

Other Books by Same Author: Click to view all books by Bridges, Susan M., Dr.


  • Fuzzy Data Mining and Genetic Algorithms... (by )
    Book Rating (13)
  • Fuzzy Data Mining and Genetic Algorithms... (by )
    Book Rating (28)
  • Panel Session : Information Security Res... (by )
    Book Rating (200)
Scroll Left
Scroll Right

Click To View

Other Books with Same Subject: Click to view all books in Technology., Reference materials, Technology and literature


  • Introduction to the Anti-Spam Research G... (by )
    Book Rating (175)
  • State Profiles 
    Book Rating (200)
  • Digital Cinema 2001 Conference Proceedin... (by )
    Book Rating (200)
  • Thermodynamic Properties of Aqueous Magn... (by )
    Book Rating (132)
  • Tables of Elastic Scattering Cross Secti... (by )
    Book Rating (200)
  • Industrial Autonomous Vehicle Project Re... (by )
    Book Rating (118)
  • Thermal Conductivity of the Elements (by )
    Book Rating (175)
  • Selected Tables of Atomic Spectra (by )
    Book Rating (200)
  • Ideal Gas Thermodynamic Properties of Ph... (by )
    Book Rating (155)
  • Oiabilitiess F Solids and Liquids of Low... (by )
    Book Rating (132)
Scroll Left
Scroll Right

 

Desktop View       Kiosk View

Copyright © World Public Library. All rights reserved. eBooks from World Public Library are sponsored by the World Public Library Association,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.