Surat Srinoy

  • Citations Per Year
Learn More
It is an important issue for the security of network to detect new intrusion attack and also to increase the detection rates and reduce false positive rates in intrusion detection system (IDS). Anomaly intrusion detection focuses on modeling normal behaviors and identifying significant deviations, which could be novel attacks. The normal and the suspicious(More)
  • Surat Srinoy
  • 2007 IEEE Symposium on Computational Intelligence…
  • 2007
Advance in information and communication technologies, force us to keep most of the information electronically, consequently, the security of information has become a fundamental issue. The traditional intrusion detection systems look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity.(More)
A Computer system now operate in an environment of near ubiquitous connectivity, whether tethered to an Ethernet cable or connected via wireless technology. While the availability of always on communication has created countless new opportunities for web based businesses, information sharing, and coordination, it has also created new opportunities for those(More)
Web Usage Mining is that area of Web Mining which deals with the extraction of interesting knowledge from logging information produced by Web servers. A challenge in web classification is how to deal with the high dimensionality of the feature space. In this paper we present Independent Component Analysis (ICA) for feature selection and using Rough Fuzzy(More)
In this paper, we propose an intrusion detection method that combines rough sets theory and fuzzy c-means for anomaly detection. The first step consists of attribute selection which is based on rough set theory for each of the 5 classes of intrusions in the Defense Advanced Research Projects Agency (DARPA) data is identified. The next phase is clustering by(More)
  • S. Srinoy
  • 2006 International Symposium on Communications…
  • 2006
Intrusion detection system looks for unusual or suspicious activity, such as patterns of network traffics that are likely indicators of unauthorized activity. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large, human labeling is tedious,(More)
Discovering user access patterns from web access log is increasing the importance of information to build up adaptive web server according to the individual user’s behavior. The variety of user behaviors on accessing information also grows, which has a great impact on the network utilization. In this paper, we present a rough set clustering to cluster web(More)
Grid computing is the principle in utilizing and sharing large-scale resources to solve the complex scientific problem. Under this principle, Grid environment has problems in providing flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. However, the major problem is in optimal job scheduling,(More)
  • Surat Srinoy
  • First Asia International Conference on Modelling…
  • 2007
Computer security is defined as the protection of computing system against threats to confidentiality, integrity, and availability. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security. It is an important issue for the security of network to detect new(More)