Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Soft computing tools to detect and characterize anomalous network behavior

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Garcia, R.C. ; Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA ; Copeland, J.A.

As part of a funded effort in network security, soft computing is used to create a system capable of detecting and characterizing anomalous network behavior. Soft computing is composed of evolutionary computational tools combined with artificial neural networks and/or fuzzy logic. Actual network traffic is used as opposed to simulated data. The benefits here are that the attacks are real and the use of the tool is in a “production” environment as opposed to being a product of purely simulated theoretical speculation

Published in:

Southeastcon 2000. Proceedings of the IEEE

Date of Conference:

2000