• DocumentCode
    2048411
  • Title

    Soft computing tools to detect and characterize anomalous network behavior

  • Author

    Garcia, Raymondc ; Opeland, Johnac

  • Author_Institution
    Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
  • fYear
    2000
  • fDate
    2000
  • Firstpage
    475
  • Lastpage
    478
  • Abstract
    As part of a funded effort in network security, soft computing is used to create a system capable of detecting and characterizing anomalous network behavior. Soft computing is composed of evolutionary computational tools combined with artificial neural networks and/or fuzzy logic. Actual network traffic is used as opposed to simulated data. The benefits here are that the attacks are real and the use of the tool is in a “production” environment as opposed to being a product of purely simulated theoretical speculation
  • Keywords
    fuzzy logic; neural nets; security of data; software tools; telecommunication networks; telecommunication security; transport protocols; TCP/IP network service detection; anomalous network behavior; artificial neural networks; evolutionary computational tools; fuzzy logic; network security; network traffic; production environment; simulated data; soft computing tools; Artificial neural networks; Computational modeling; Computer networks; Computerized monitoring; Data security; Fuzzy logic; Genetic algorithms; Genetic programming; Neural networks; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Southeastcon 2000. Proceedings of the IEEE
  • Conference_Location
    Nasville, TN
  • Print_ISBN
    0-7803-6312-4
  • Type

    conf

  • DOI
    10.1109/SECON.2000.845615
  • Filename
    845615