State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Intrusion detection
A methodology to detect temporal regularities in user behavior for anomaly detection
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Implementing Internet Security
Implementing Internet Security
Fuzzy System Design Principles
Fuzzy System Design Principles
A Process Approach to Information Security Management
IFIP/Sec '93 Proceedings of the IFIP TC11, Ninth International Conference on Information Security: Computer Security
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Computer defense using artificial intelligence
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Hi-index | 0.00 |
Computer security, and intrusion detection in particular, have become increasingly important in today's business environment, to ensure safe and trusted commerce between business partners as well as effective organisational functioning. Various approaches to intrusion detection are currently being utilized, but unfortunately in practice these approaches are relatively ineffective and inefficient. New means and ways that will minimize these shortcomings must, therefore, continuously be researched and defined. This paper will propose a proactive and dynamic model, based on trend analysis, fuzzy logic and neural networks that could be utilized to minimise and control intrusion in an organisation's computer system.