Computer Science – Cryptography and Security
Scientific paper
2004-05-13
Soft Computing in Knowledge Discovery: Methods and Applications, Saman Halgamuge and Lipo Wang (Eds.), Studies in Fuzziness an
Computer Science
Cryptography and Security
Scientific paper
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. This chapter presents a soft computing approach to detect intrusions in a network. Among the several soft computing paradigms, we investigated fuzzy rule-based classifiers, decision trees, support vector machines, linear genetic programming and an ensemble method to model fast and efficient intrusion detection systems. Empirical results clearly show that soft computing approach could play a major role for intrusion detection.
Abraham Ajith
Jain Ravi
No associations
LandOfFree
Soft Computing Models for Network Intrusion Detection Systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Soft Computing Models for Network Intrusion Detection Systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Soft Computing Models for Network Intrusion Detection Systems will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-671232