{"title":"利用软计算技术进行实时异常检测","authors":"J. Copeland, R.C. Garcia","doi":"10.1109/SECON.2001.923097","DOIUrl":null,"url":null,"abstract":"This body of work sheds light on the current problems related to network security and applies intelligent tools to some of these problems. While the use of intelligent tools in network security is new, the few papers that have been published offer promising results. Of particular interest is the application of neural networks, fuzzy logic, and evolutionary computation to network security problems (sniffing, IP spoofing, denial of service attacks, etc.). The work here develops a technique that utilizes soft computing tools in order to detect anomalous network behavior, detect and have real-time applicability.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Real-time anomaly detection using soft-computing techniques\",\"authors\":\"J. Copeland, R.C. Garcia\",\"doi\":\"10.1109/SECON.2001.923097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This body of work sheds light on the current problems related to network security and applies intelligent tools to some of these problems. While the use of intelligent tools in network security is new, the few papers that have been published offer promising results. Of particular interest is the application of neural networks, fuzzy logic, and evolutionary computation to network security problems (sniffing, IP spoofing, denial of service attacks, etc.). The work here develops a technique that utilizes soft computing tools in order to detect anomalous network behavior, detect and have real-time applicability.\",\"PeriodicalId\":368157,\"journal\":{\"name\":\"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2001.923097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2001.923097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Real-time anomaly detection using soft-computing techniques
This body of work sheds light on the current problems related to network security and applies intelligent tools to some of these problems. While the use of intelligent tools in network security is new, the few papers that have been published offer promising results. Of particular interest is the application of neural networks, fuzzy logic, and evolutionary computation to network security problems (sniffing, IP spoofing, denial of service attacks, etc.). The work here develops a technique that utilizes soft computing tools in order to detect anomalous network behavior, detect and have real-time applicability.