DocumentCode
2048411
Title
Soft computing tools to detect and characterize anomalous network behavior
Author
Garcia, Raymondc ; Opeland, Johnac
Author_Institution
Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
fYear
2000
fDate
2000
Firstpage
475
Lastpage
478
Abstract
As part of a funded effort in network security, soft computing is used to create a system capable of detecting and characterizing anomalous network behavior. Soft computing is composed of evolutionary computational tools combined with artificial neural networks and/or fuzzy logic. Actual network traffic is used as opposed to simulated data. The benefits here are that the attacks are real and the use of the tool is in a “production” environment as opposed to being a product of purely simulated theoretical speculation
Keywords
fuzzy logic; neural nets; security of data; software tools; telecommunication networks; telecommunication security; transport protocols; TCP/IP network service detection; anomalous network behavior; artificial neural networks; evolutionary computational tools; fuzzy logic; network security; network traffic; production environment; simulated data; soft computing tools; Artificial neural networks; Computational modeling; Computer networks; Computerized monitoring; Data security; Fuzzy logic; Genetic algorithms; Genetic programming; Neural networks; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Southeastcon 2000. Proceedings of the IEEE
Conference_Location
Nasville, TN
Print_ISBN
0-7803-6312-4
Type
conf
DOI
10.1109/SECON.2000.845615
Filename
845615
Link To Document