DocumentCode
2650776
Title
Network security: mapping intrusion & anomaly detection to very-high-degree polynomials
Author
Garcia, Raymond C.
Volume
2
fYear
2004
fDate
7-10 Nov. 2004
Firstpage
1449
Abstract
Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems. What is introduced here is a novel approach to network security whereby problematic behavior detection is treated as a high to very-high-order polynomial factorization problem. Network security characteristics are drawn from the factorization results and test cases are introduced. The actual details are in the context of the "forward" use case where polynomials are mapped from rule sets. "Reverse" use is also described.
Keywords
computer networks; database management systems; knowledge based systems; polynomials; telecommunication security; anomaly detection; mapping intrusion; network security; problematic behavior detection; soft-computing systems; very-high-order polynomial factorization problem; Algorithm design and analysis; Data analysis; Data mining; Data visualization; Intrusion detection; Knowledge based systems; Man machine systems; Polynomials; Testing; Visual databases;
fLanguage
English
Publisher
ieee
Conference_Titel
Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on
Print_ISBN
0-7803-8622-1
Type
conf
DOI
10.1109/ACSSC.2004.1399394
Filename
1399394
Link To Document