DocumentCode :
2973939
Title :
Discrete fuzzy transform applied to computer anomaly detection
Author :
Garcia, Juan Manuel Garcia
Author_Institution :
Comput. Syst. Dept., Inst. Tecnol. de Morelia, Morelia, Mexico
fYear :
2011
fDate :
18-20 March 2011
Firstpage :
1
Lastpage :
4
Abstract :
Intrusion detection systems (IDS) are widely applied to computer networks and systems as an information security control. Most of the current IDS work by detecting patterns of behavior of previously known attacks (attack signature). One drawback of signature based IDS is that they are vulnerable to previously unknown attacks. As an alternative, anomaly based IDS use a model of what is considered a normal behavior of a computer system or network and then they could detect any attack, know or unknown. The main problem of this approach is to find an adequate model of normality. In this paper, we present a method to build a model of behavior of computer network and systems. In this model a set of fuzzy organizational states are deduced from time series of computer resources utilization applying the discrete fuzzy transform.
Keywords :
computer network security; digital signatures; fuzzy set theory; transforms; attack signature; computer anomaly detection; computer networks; computer resources utilization; computer system; discrete fuzzy transform; fuzzy organizational states; information security control; intrusion detection systems; Computational modeling; Computer networks; Computers; Electronic mail; Hidden Markov models; Intrusion detection; Transforms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fuzzy Information Processing Society (NAFIPS), 2011 Annual Meeting of the North American
Conference_Location :
El Paso, TX
ISSN :
Pending
Print_ISBN :
978-1-61284-968-3
Electronic_ISBN :
Pending
Type :
conf
DOI :
10.1109/NAFIPS.2011.5751919
Filename :
5751919
Link To Document :
بازگشت