A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots.
Nitin NaikPaul JenkinsPublished in: FUSION (2018)
Keyphrases
- ddos attacks
- detecting malicious
- forensic analysis
- network intrusion detection systems
- fuzzy sets
- network intrusion
- denial of service attacks
- detect malicious
- malicious activities
- dos attacks
- fuzzy logic
- intrusion detection system
- membership functions
- identity theft
- countermeasures
- fuzzy neural network
- human computer interaction
- user interaction
- fuzzy set theory
- fuzzy numbers
- malicious attacks
- terrorist attacks
- multi agent systems
- web pages