An adaptive fuzzy logic model for intrusion detection in computer networks based on artificial immune system

The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

Подобные документы

  • Аналіз популярних сатиричних анімаційних проектів дорослого блоку на американському телеканалі Cartoon Network. Знайомство з особливостями виявлення загального портрету цільової аудиторії Adult Swim. Характеристика відомих представників інфотейнменту.

    статья, добавлен 21.04.2020

  • Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.

    статья, добавлен 08.12.2024

  • Данные о производительности сети, определение интервалов времени хранения. Принцип неопределенности Гейзенберга для SNMP-опроса (Simple Network Management Protocol). Стратегии установки пороговых значений. Просмотр данных и предоставление их потребителю.

    лекция, добавлен 17.04.2015

  • New computer arithmetics doing the parallel process of multiplying and division. A scoring in accuracy of representation of numbers is as result of the development of arithmetics. Factorizations of operands is in a basis of parallel computer arithmetics.

    статья, добавлен 10.08.2013

  • Предназначение устройства с числовым программным управлением, взаимодействие с устройствами более высокого уровня с применением новейших протоколов обмена информацией. Протокол Controller Area Network (ISO/DIS 11898) – организация сети, принцип работы.

    дипломная работа, добавлен 27.10.2010

  • Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.

    книга, добавлен 25.11.2013

  • Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.

    статья, добавлен 09.09.2021

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга, добавлен 04.10.2014

  • It is developed software integration of different computer-aided design systems in the design of wind power plants. The block-diagram of computer-aided design system is presented. Analysis and especially considering of the format conversion mechanism.

    статья, добавлен 26.06.2016

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.

    статья, добавлен 01.12.2017

  • История развития нейросетей, характеристика их главных задач. Особенности архитектуры и параметры обучения. Краткое описание программы Neural Network Wizard. Изучение принципов работы программного эмулятора нейрокомпьютера. Сбор статистики по процессу.

    реферат, добавлен 14.10.2013

  • Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.

    статья, добавлен 04.09.2024

  • Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.

    лекция, добавлен 28.12.2013

  • Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.

    статья, добавлен 26.01.2021

  • Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.

    статья, добавлен 29.01.2016

  • A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.

    реферат, добавлен 09.12.2014

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    учебное пособие, добавлен 08.03.2014

  • Разработка на основе технологии Neural Network программных комплексов для прогнозирования различных явлений, статистической обработки данных в медицинском учреждении. Система принятия решений при управлении пациентопотоком в медицинских учреждениях.

    статья, добавлен 05.04.2020

  • Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.

    книга, добавлен 08.03.2014

  • The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.

    статья, добавлен 06.07.2023

  • Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.

    учебное пособие, добавлен 11.10.2014

  • Автоматизация построения синтаксически и семантически правильной имитационной модели. Математическая теория систем массового обслуживания; модели Queue Network. Проверка синтаксической правильности модели в статье; использование графовой грамматики.

    статья, добавлен 26.04.2019

  • Develop a mechanism that identifies the line with Romanian chromatic words on the basis of computer technologies. The first phase of development of the dictionary meanings of poetic colors. Cooperation of linguists and specialists in informatics.

    статья, добавлен 23.02.2016

  • An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.

    статья, добавлен 12.01.2023

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.