Fuzzy Preferences based STRIDE Threat Model for Network Intrusion Detection

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Network Intrusion Detection Model based on Fuzzy Support Vector Machine

Network intrusion detection is of great importance in the research field of information security in computer networks. In this paper, we concentrate on how to automatically detect the network intrusion behavior utilizing fuzzy support vector machine. After analyzing the related works of the proposed paper, we introduce the main characterics of fuzzy support vector machine, and demonstrate its f...

متن کامل

Neuro-fuzzy Based Intrusion Detection Systems for Network Security

Computer networks are more vulnerable to insider and outsider attacks in recent days due to its widespread use in each field. For that aspect, numbers of security mechanism have been applied to minimize the effect of possible attacks in the network. One of very appealing concept towards network security is intrusion detection system that can able to identify the difference between normal and ab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing and Network Technology

سال: 2017

ISSN: 2210-1519

DOI: 10.12785/ijcnt/050302