• DocumentCode
    2650776
  • Title

    Network security: mapping intrusion & anomaly detection to very-high-degree polynomials

  • Author

    Garcia, Raymond C.

  • Volume
    2
  • fYear
    2004
  • fDate
    7-10 Nov. 2004
  • Firstpage
    1449
  • Abstract
    Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems. What is introduced here is a novel approach to network security whereby problematic behavior detection is treated as a high to very-high-order polynomial factorization problem. Network security characteristics are drawn from the factorization results and test cases are introduced. The actual details are in the context of the "forward" use case where polynomials are mapped from rule sets. "Reverse" use is also described.
  • Keywords
    computer networks; database management systems; knowledge based systems; polynomials; telecommunication security; anomaly detection; mapping intrusion; network security; problematic behavior detection; soft-computing systems; very-high-order polynomial factorization problem; Algorithm design and analysis; Data analysis; Data mining; Data visualization; Intrusion detection; Knowledge based systems; Man machine systems; Polynomials; Testing; Visual databases;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on
  • Print_ISBN
    0-7803-8622-1
  • Type

    conf

  • DOI
    10.1109/ACSSC.2004.1399394
  • Filename
    1399394