Show simple item record

dc.contributor.authorAbouzakhar, Nasser
dc.contributor.authorManson, Gordon
dc.date.accessioned2014-05-28T09:00:22Z
dc.date.available2014-05-28T09:00:22Z
dc.date.issued2003
dc.identifier.citationAbouzakhar , N & Manson , G 2003 , ' Networks security measures using neuro-fuzzy agents ' , Information Management & Computer Security , vol. 11 , no. 1 , pp. 33-38 . https://doi.org/10.1108/09685220310463713
dc.identifier.issn0968-5227
dc.identifier.otherPURE: 7059672
dc.identifier.otherPURE UUID: 35edb65d-b802-4741-8c3c-f1c7479f6ad2
dc.identifier.otherScopus: 0037592637
dc.identifier.urihttp://hdl.handle.net/2299/13549
dc.description.abstractThe growing dependence of modern society on telecommunication and information networks and e-type systems has become inevitable. However, those types of systems are vulnerable to malicious attacks. The speed and automation in network attack techniques continue to increase. An achievable automated attack or unauthorised access to a particular organization network could lead to devastating effects on its reputation and imminent loss of life. In this paper an innovative way is proposed to detect network attacks of a distributed nature such as denial of service (DoS) attacks. The proposed scheme is mainly based on neuro-fuzzy intelligence in order to learn and determine the fuzzy parameter functions that represent network traffic behaviour. Neuro-fuzzy agents combine the features of fuzzy logic and neural networks and they have been proposed to overcome the limitations of human expertise in defining fuzzy membership functions, especially for complex environments, such as information networks.en
dc.format.extent6
dc.language.isoeng
dc.relation.ispartofInformation Management & Computer Security
dc.subjectNetworks, Security,Fuzzy logics, Neural networks, Hacking
dc.titleNetworks security measures using neuro-fuzzy agentsen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
dc.relation.schoolSchool of Computer Science
dcterms.dateAccepted2003
rioxxterms.versionVoR
rioxxterms.versionofrecordhttps://doi.org/10.1108/09685220310463713
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record