Intrusion detection using fuzzy logic and evolutionary algorithm techniques
Keywords and Phrases
Bucket brigade algorithm; C4.5 rule
"An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse detection) and unknown attacks (anomaly detection combined with non-self classification). This thesis research studies the problem of automating the generation of a high-fidelity 'detection model' that can recognize both known and variations on known attacks through the use of a Fuzzy Learning Classifier System"--Abstract, leaf iii.
M.S. in Computer Science
University of Missouri--Rolla
x, 62 leaves
© 2005 Monu Bambroo, All rights reserved.
Thesis - Citation
Library of Congress Subject Headings
Print OCLC #
Link to Catalog Record
Full-text not available: Request this publication directly from Missouri S&T Library or contact your local library.http://laurel.lso.missouri.edu/record=b5451585~S5
Bambroo, Monu, "Intrusion detection using fuzzy logic and evolutionary algorithm techniques" (2005). Masters Theses. 3722.
This document is currently not available here.