|
Volumn 7, Issue , 2010, Pages
|
The intrusion detection system based on fuzzy association rules mining
|
Author keywords
Association rules; Denial of service attack; Fuzzy association rules; Fuzzy theory; Network security
|
Indexed keywords
ABNORMAL DETECTION;
CUT-OFF;
DENIAL OF SERVICE;
DENIAL OF SERVICE ATTACKS;
DOS ATTACKS;
FALSE POSITIVE;
FUZZY ASSOCIATION RULE;
FUZZY THEORY;
INFORMATION DETECTION;
INTRUSION DETECTION SYSTEMS;
NETWORK BEHAVIORS;
NETWORK INTRUSION DETECTION SYSTEMS;
PACKET FLOWS;
ASSOCIATIVE PROCESSING;
COMPUTER CRIME;
FUZZY LOGIC;
FUZZY RULES;
INTRUSION DETECTION;
NETWORK SECURITY;
ASSOCIATION RULES;
|
EID: 77958026652
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCET.2010.5485674 Document Type: Conference Paper |
Times cited : (4)
|
References (6)
|