scholar.google.com › citations
Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems [1]. ... (2) ...
People also ask
What is an example of anomaly detection system?
What is anomaly detection used for?
What are the three basic approaches to anomaly detection?
Which technique is used for anomaly detection?
This paper introduces an anomaly-based Intrusion Detection (IDS) system using fuzzy logic. The fuzzy logic inference system implemented as a detection method ...
We developed a fuzzy anomaly detection model for IPv6, using fuzzy detection anomaly ... The result shows that the proposed system can detect most of IPv6 attacks ...
In this paper, we proposed a novel fuzzy anomaly detection system based on the hybridization of PSO and K-means clustering algorithms over Content-Centric ...
In this paper, we propose a novel anomaly detection framework which integrates soft computing techniques to eliminate sharp boundary between normal and ...
A fuzzy inference system offers the results in a more readable and understandable form. This paper introduces an anomaly-based Intrusion Detection (IDS) system ...
Jun 22, 2021 · This paper introduces an anomaly-based Intrusion Detection (IDS) system using fuzzy logic. The fuzzy logic inference system implemented as a ...
A fuzzy anomaly detection system based on hybrid PSO-Kmeans ...
www.sciencedirect.com › article › pii
Feb 3, 2015 · The proposed fuzzy detection method consists of two inputs (classification and outlier), one output, and four main parts: fuzzification, rules, ...
Anomaly detection is one of the typical intrusion defense approaches, in which the entropy-based anomaly detection approach has been extensively studied which ...
In this paper, we present a novel fuzzy anomaly detection system that works in two phases. In the first phase – the training phase – we propose an ...