Title :
Soft computing tools to detect and characterize anomalous network behavior
Author :
Garcia, Raymondc ; Opeland, Johnac
Author_Institution :
Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
As part of a funded effort in network security, soft computing is used to create a system capable of detecting and characterizing anomalous network behavior. Soft computing is composed of evolutionary computational tools combined with artificial neural networks and/or fuzzy logic. Actual network traffic is used as opposed to simulated data. The benefits here are that the attacks are real and the use of the tool is in a “production” environment as opposed to being a product of purely simulated theoretical speculation
Keywords :
fuzzy logic; neural nets; security of data; software tools; telecommunication networks; telecommunication security; transport protocols; TCP/IP network service detection; anomalous network behavior; artificial neural networks; evolutionary computational tools; fuzzy logic; network security; network traffic; production environment; simulated data; soft computing tools; Artificial neural networks; Computational modeling; Computer networks; Computerized monitoring; Data security; Fuzzy logic; Genetic algorithms; Genetic programming; Neural networks; Telecommunication traffic;
Conference_Titel :
Southeastcon 2000. Proceedings of the IEEE
Conference_Location :
Nasville, TN
Print_ISBN :
0-7803-6312-4
DOI :
10.1109/SECON.2000.845615