Utilising fuzzy logic and trend analysis for effective intrusion detection

被引:29
作者
Botha, M [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Technikon, Port Elizabeth, South Africa
关键词
computer misuse; intrusion detection; fuzzy logic; pattern recognition;
D O I
10.1016/S0167-4048(03)00511-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to ensure safe and trusted commerce between business partners as well as effective organizational functioning. Various approaches to intrusion detection are currently being utilized, but unfortunately in practice these approaches are relatively ineffective and inefficient. New means and ways that will minimize these shortcomings must, therefore, continuously be researched and defined. This paper will propose a proactive and dynamic approach, based on trend analysis and fuzzy logic that could be utilized to minimize and control intrusion in an organization's computer system.
引用
收藏
页码:423 / 434
页数:12
相关论文
共 17 条
  • [1] [Anonymous], 1992, NEURAL NETWORKS FUZZ
  • [2] Bace Rebecca Gurley, 2000, Intrusion Detection
  • [3] Berkan R.C, 1997, FUZZY SYSTEM DESIGN
  • [4] BERST J, 1999, HACKING 101 WHY SHOU
  • [5] DOWNLAND PS, 2000, IFEP 2000
  • [6] FORREST F, INTRUSION DETECTION
  • [7] *GMITS, 1997, 133352 GMITS ISOIEC
  • [8] KAEHLER S, 1999, FUZZY LOGIC INTRO
  • [9] KOSKO B, 1990, FUZZY THINKING
  • [10] NOMAD S, 1999, HACK FAQ