Songlun Zhao

Learn More
Current intrusion detection techniques mainly focus on discovering abnormal system events in computer networks and distributed communication systems. Clustering techniques are normally utilized to determine a possible attack. Due to the uncertainty nature of intrusions, fuzzy sets play an important role in recognizing dangerous events and reducing false(More)
Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Support Vector Machines (SVM) as a classical pattern recognition tool have been widely used for intrusion detection. However, conventional SVM methods do not concern different characteristics of features in building an(More)
  • 1