DocumentCode :
2650776
Title :
Network security: mapping intrusion & anomaly detection to very-high-degree polynomials
Author :
Garcia, Raymond C.
Volume :
2
fYear :
2004
fDate :
7-10 Nov. 2004
Firstpage :
1449
Abstract :
Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems. What is introduced here is a novel approach to network security whereby problematic behavior detection is treated as a high to very-high-order polynomial factorization problem. Network security characteristics are drawn from the factorization results and test cases are introduced. The actual details are in the context of the "forward" use case where polynomials are mapped from rule sets. "Reverse" use is also described.
Keywords :
computer networks; database management systems; knowledge based systems; polynomials; telecommunication security; anomaly detection; mapping intrusion; network security; problematic behavior detection; soft-computing systems; very-high-order polynomial factorization problem; Algorithm design and analysis; Data analysis; Data mining; Data visualization; Intrusion detection; Knowledge based systems; Man machine systems; Polynomials; Testing; Visual databases;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on
Print_ISBN :
0-7803-8622-1
Type :
conf
DOI :
10.1109/ACSSC.2004.1399394
Filename :
1399394
Link To Document :
بازگشت