Modified evidence theory for performance enhancement of Intrusion Detection Systems.
Ciza ThomasN. BalakrishnanPublished in: FUSION (2008)
Keyphrases
- intrusion detection system
- evidence theory
- intrusion detection
- network security
- anomaly detection
- risk assessment
- computer networks
- network intrusion detection
- network traffic
- evaluation model
- distributed intrusion detection
- computer security
- alert correlation
- intrusion prevention
- network intrusion detection systems
- computer systems
- cyber security
- fuzzy membership functions
- pattern recognition
- cyber attacks
- misuse detection
- information security
- knowledge discovery
- normal behavior
- real world
- attack detection
- neural network