To Identify Suspicious Activity in Anomaly Detection based on Soft Computing.
Witcha ChimphleeMohd. Noor Md. SapAbdul Hanan AbdullahSiriporn ChimphleeSurat SrinoyPublished in: Artificial Intelligence and Applications (2006)
Keyphrases
- anomaly detection
- soft computing
- fuzzy logic
- computational intelligence
- intrusion detection
- network traffic
- intelligent systems
- network intrusion detection
- evolutionary computation
- anomalous behavior
- network anomaly detection
- hybrid intelligent systems
- computer security
- neural network
- detect anomalies
- intrusion detection system
- detecting anomalies
- artificial neural networks
- rough sets
- fuzzy systems
- fuzzy sets
- information processing
- malware detection
- negative selection algorithm
- network security
- data mining
- unsupervised learning
- evolutionary algorithm
- feature space
- data analysis
- real world