Soft computing in network intrusion detection

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[The explosive growth of computer networking has brought about limitless possibilities and opportunities along with increased risks of malicious intrusions. It is therefore, critical to have the security mechanisms that are able to prevent security violations. However, complete prevention of security breaches does not appear to be practical. Intrusion detection can be regarded as an alternative, or as a compromise to this situation. Several techniques for detecting intrusions have been studied by many researchers. This paper discusses why intrusion detection systems are needed and presents the main techniques that these systems utilize. In any of these techniques, the need for exploiting the tolerance for imprecision and uncertainty to achieve robustness and low solution costs is evident. It can be noted that, this is in fact, the guiding principle of soft computing and more particularly soft computing. This work reports the preliminary steps taken in the study of the implications and advantages of using fuzzy logic for handling intrusion detection through approximate reasoning and approximate matching.]]
    Original languageEnglish
    Title of host publicationInformation Technology and Organizations in the 21st Century: Challenges & Solutions: Proceedings of the 2004 International Business Information Management Conference: IBIMA 2004
    PublisherIBIMA
    Number of pages6
    ISBN (Print)0975339311
    Publication statusPublished - 2004
    EventInternational Business Information Management -
    Duration: 1 Jan 2004 → …

    Conference

    ConferenceInternational Business Information Management
    Period1/01/04 → …

    Keywords

    • computer security
    • computer networks
    • data protection
    • soft computing
    • fuzzy logic

    Fingerprint

    Dive into the research topics of 'Soft computing in network intrusion detection'. Together they form a unique fingerprint.

    Cite this