IEEE Transactions on Software Engineering - Special issue on computer security and privacy
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Intrusion detection: approach and performance issues of the SECURENET system
Computers and Security
Internet security for business
Internet security for business
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Intelligent decision support methods: the science of knowledge work
Intelligent decision support methods: the science of knowledge work
Mining in a data-flow environment: experience in network intrusion detection
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Mining time-changing data streams
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
Using Text Categorization Techniques for Intrusion Detection
Proceedings of the 11th USENIX Security Symposium
Journal of Computer Security
Logic Induction of Valid Behavior Specifications for Intrusion Detection
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
High coverage detection of input-related security facults
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
On gray-box program tracking for anomaly detection
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
gNIDS: rule-based network intrusion detection system using genetic algorithms
International Journal of Intelligent Systems Technologies and Applications
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Intrusion detection is a type of computer network security system that attempts toidentify inappropriate use of the system. As more corporate computer systems become linked to the internet and as more stakeholder transactions take place between systems, the identification and prevention of computer network misuse becomes increasingly critical. Expert system technology is often used to construct intruder detection systems. However, Intrusion Detection System (IDS) researchers have tended to build systems that are hard to manage, lack intuitive user interfaces and are cumbersome to use in real-live situations. In this paper, we present an adaptive expert system for intrusion detection that utilises fuzzy sets. This system has the ability to adapt to the type and/or degree of threat and is relatively simple to implement when used with computer system networks. Examples of rule sets are presented. The adaptive ability of the system is demonstrated by experimenting with the system using Clips 6.10.