2006
DOI: 10.1093/ietfec/e89-a.6.1630
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Intelligent Intrusion Detection, Decision, Response System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…With the same experiment environments as that of the Reference [5], the two kinds of the experiments were done and are shown in Table 7. Table 7.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…With the same experiment environments as that of the Reference [5], the two kinds of the experiments were done and are shown in Table 7. Table 7.…”
Section: Methodsmentioning
confidence: 99%
“…The short specifictime and the long specific time were set into the 24 hours and 30 days respectively. The responses were divided into four level corresponding to the different degrees of danger as following [5]: • the results of intrusion decision for the two methods completely match at the above mentioned dangerous degree levels.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same experiment environment with the paper [1], the two kinds of the experiments were done and are shown in Table 3. Where "Exp1-old" and "Exp2-old" are the experiments with the fuzzy method, "Exp1-new" and "Exp2-new" are the experiments with the neuro-fuzzy approach, "1∼N2 max " is the N1 taking value from 1 to N2's maximum that was 5 times N1 max , "1∼N1 max " is the N1 taking value from 1 to N1's maximum that was taken as 10 and Table 3.…”
Section: Methodsmentioning
confidence: 99%
“…The network security becomes more and more important. In the Reference [1], we proposed one novel intelligent intrusion detection, decision, response system (I 2 D 2 RS) with fuzzy rule-base method. This I 2 D 2 RS utilized the two essential informations of the failed login's users: the failed login's times and time, to judge automatically who is a normal user and who is a misuse user from the failed login's users with the fuzzy rules built on the measures and skills of the experienced system/security administrators.…”
Section: Introductionmentioning
confidence: 99%