Surat Srinoy

Learn More
Advance in information and communication technologies, force us to keep most of the information electronically, consequently, the security of information has become a fundamental issue. The traditional intrusion detection systems look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity.(More)
It is an important issue for the security of network to detect new intrusion attack and also to increase the detection rates and reduce false positive rates in intrusion detection system (IDS). Anomaly intrusion detection focuses on modeling normal behaviors and identifying significant deviations, which could be novel attacks. The normal and the suspicious(More)
Web Usage Mining is that area of Web Mining which deals with the extraction of interesting knowledge from logging information produced by Web servers. A challenge in web classification is how to deal with the high dimensionality of the feature space. In this paper we present Independent Component Analysis (ICA) for feature selection and using Rough Fuzzy(More)
A Computer system now operate in an environment of near ubiquitous connectivity, whether tethered to an Ethernet cable or connected via wireless technology. While the availability of always on communication has created countless new opportunities for web based businesses, information sharing, and coordination, it has also created new opportunities for those(More)
Intrusion detection system looks for unusual or suspicious activity, such as patterns of network traffics that are likely indicators of unauthorized activity. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large, human labeling is tedious,(More)
—Discovering user access patterns from web access log is increasing the importance of information to build up adaptive web server according to the individual user's behavior. The variety of user behaviors on accessing information also grows, which has a great impact on the network utilization. In this paper, we present a rough set clustering to cluster web(More)
Grid computing is the principle in utilizing and sharing large-scale resources to solve the complex scientific problem. Under this principle, Grid environment has problems in providing flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. However, the major problem is in optimal job scheduling,(More)
Computer security is defined as the protection of computing system against threats to confidentiality, integrity, and availability. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security. It is an important issue for the security of network to detect new(More)