Download now Free registration required
Most of the soft computing algorithms will learn from human knowledge and mimic human skills. The authors survey the principal constituents of soft computing techniques including fuzzy logic, artificial neural networks, support vector machines, probabilistic reasoning, genetic algorithms and multi-variate adaptive regressive splines. Soft computing techniques are being widely used by the IDS community due to their generalization capabilities that help in detecting known and unknown intrusions or the attacks that have no previously described patterns. Due to increasing incidents of cyber attacks, building effective Intrusion Detection Systems (IDSs) are essential for protecting information systems security.
- Format: PDF
- Size: 233.15 KB