Security

Learning of Intrusion Detector in Conceptual Approach of Fuzzy Towards Intrusion Methodology

Download Now Free registration required

Executive Summary

This paper proposes the Information system security is the Integrity and safety of its resources and activities, In the cyber world, it can be almost impossible to trace sophisticated attacks to their trace source. Almost all business organizations have is that use integrated technologies such as the networks of computer's company intranets. Under these circumstances threats from outside the organization must be addressed, because the damages from non-secured information systems can result in catastrophic consequences for the organization. To reduce this dependence, various preprocessing techniques such as data mining, neural networks, Petri nets, state transition diagram, genetic algorithms and fuzzy based logics are used.

  • Format: PDF
  • Size: 764.3 KB