An adaptive fuzzy logic model for intrusion detection in computer networks based on artificial immune system

The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

Подобные документы

  • The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.

    статья, добавлен 22.12.2016

  • Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.

    статья, добавлен 27.05.2021

  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций, добавлен 20.10.2016

  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья, добавлен 22.12.2016

  • The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.

    дипломная работа, добавлен 30.06.2015

  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция, добавлен 15.04.2014

  • Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.

    дипломная работа, добавлен 01.12.2019

  • Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.

    презентация, добавлен 13.06.2015

  • Functioning system BIOS when enabling the computer. Program CMOS Setup. The main sections of the program BIOS Setup. Advanced BIOS, Chipset Features. Power Management Setup. Adjustment computer system parameter. Determination load device operating system.

    реферат, добавлен 02.06.2009

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • A network protocol as a specification for the format and relative timing of the messages exchanged. Formalizing why and how vulnerabilities occur in protocols. Previous models. Automated tools. Terminology relationships. A network time protocol exploit.

    статья, добавлен 15.09.2012

  • The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.

    статья, добавлен 26.06.2016

  • The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.

    статья, добавлен 14.01.2017

  • The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.

    статья, добавлен 28.08.2016

  • Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.

    доклад, добавлен 04.12.2011

  • Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.

    статья, добавлен 23.02.2016

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа, добавлен 02.09.2016

  • Modeling an optoelectronic fire smoke alarm detector at the functional diagram level by means of Matlab tools. Characteristics of developed detector model and evaluating the ability of the logic unit to distinguishing between fire signals and noise.

    статья, добавлен 26.06.2016

  • Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.

    учебное пособие, добавлен 08.03.2014

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    статья, добавлен 25.03.2016

  • Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    статья, добавлен 09.10.2018

  • The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.

    учебное пособие, добавлен 11.10.2014

  • Features of the mechanism that will help to identify lines with Romanian chromatic words on the basis of computer technology. Steps develop a dictionary of poetic meanings of colors. Development of the dictionary linguists and computer scientists.

    статья, добавлен 23.02.2016

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

    лекция, добавлен 23.05.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.