Soft computing in network intrusion detection

Research output: Chapter in Book / Conference PaperConference Paper

Abstract

The explosive growth of computer networking has brought about limitless possibilities and opportunities along with increased risks of malicious intrusions. It is therefore, critical to have the security mechanisms that are able to prevent security violations. However, complete prevention of security breaches does not appear to be practical. Intrusion detection can be regarded as an alternative, or as a compromise to this situation. Several techniques for detecting intrusions have been studied by many researchers. This paper discusses why intrusion detection systems are needed and presents the main techniques that these systems utilize. In any of these techniques, the need for exploiting the tolerance for imprecision and uncertainty to achieve robustness and low solution costs is evident. It can be noted that, this is in fact, the guiding principle of soft computing and more particularly soft computing. This work reports the preliminary steps taken in the study of the implications and advantages of using fuzzy logic for handling intrusion detection through approximate reasoning and approximate matching.
Original languageEnglish
Title of host publicationInformation Technology and Organizations in the 21st Century: Challenges & Solutions: Proceedings of the 2004 International Business Information Management Conference: IBIMA 2004
PublisherIBIMA
Number of pages6
ISBN (Print)0975339311
Publication statusPublished - 2004
EventInternational Business Information Management -
Duration: 1 Jan 2004 → …

Conference

ConferenceInternational Business Information Management
Period1/01/04 → …

Keywords

  • computer security
  • computer networks
  • data protection
  • soft computing
  • fuzzy logic

Fingerprint

Dive into the research topics of 'Soft computing in network intrusion detection'. Together they form a unique fingerprint.

Cite this