Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/394948Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Mahmoud Jazzar | - |
| dc.contributor.author | Aman Jantan | - |
| dc.date.accessioned | 2023-06-15T07:52:39Z | - |
| dc.date.available | 2023-06-15T07:52:39Z | - |
| dc.identifier.other | ukmvital:122442 | - |
| dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/394948 | - |
| dc.description.abstract | Fuzzy cognitive maps (FCM) are ideal causal knowledge acquiring tools with fuzzy signed graphs which can be presented as an associative single layer neural network. Using FCM, our methodology attempt to diagnose and direct network traffic data based on its relevance to attack or normal connections. By quantifying the causal inference process, we can determine the attack detection and the severity of odd packets. As such, packets with low causal relations to attacks can be dropped or ignored and/or packets with high causal relations to attacks are to be highlighted. In this paper, we present a new real-time intrusion detection approach using FCM to replicate normal and attack network connection. | - |
| dc.language.iso | eng | - |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US | - |
| dc.subject | Real-time intrusion | - |
| dc.subject | Fuzzy cognitive maps modeling | - |
| dc.title | Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation | - |
| dc.type | Seminar Papers | - |
| dc.format.pages | 6 | - |
| dc.identifier.callno | T58.5.C634 2008 kat sem j.2 | - |
| dc.contributor.conferencename | International Symposium on Information Technology | - |
| dc.coverage.conferencelocation | Kuala Lumpur Convention Centre | - |
| dc.date.conferencedate | 26/08/2008 | - |
| Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding | |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.