Fuzzy intrusion detection system via data mining technique with sequences of system calls

There are two main approaches for implementing IDS; host based and network based. While the former is implemented in the form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detec...

Full description

Saved in:
Bibliographic Details
Main Authors: Sekeh, Mohammad Akbarpour, Maarof, Mohd. Aizani
Format: Conference or Workshop Item
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/id/eprint/15221/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:101217
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia