2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH862
DOI: 10.1109/nafips.2002.1018104
|View full text |Cite
|
Sign up to set email alerts
|

Activity profiles for intrusion detection

Abstract: Abstract-This paper one of the series of papers in which we lay down the foundations for design of trustworthy computing systems. We propose here a methodology to perform behavior-based intrusion detection on security protocols using fuzzy relational methods. Fuzzified Allen temporal algebra plays an important role in capturing the time dimension of concurrent activites of principals as well as of intruders.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…The work by [17][18][19] describes attack patterns or normal behavior patterns using Allen's temporal relations [20] such as "before", "after" and "meet" between events (e.g., a login by user x should be followed by a logout).…”
Section: Related Workmentioning
confidence: 99%
“…The work by [17][18][19] describes attack patterns or normal behavior patterns using Allen's temporal relations [20] such as "before", "after" and "meet" between events (e.g., a login by user x should be followed by a logout).…”
Section: Related Workmentioning
confidence: 99%