Techniques Applied to High Performance Computing Intrusion Detection

@inproceedings{Bridges2002TechniquesAT,
  title={Techniques Applied to High Performance Computing Intrusion Detection},
  author={Susan M. Bridges and Rayford B. Vaughn and Ambareen Siraj},
  year={2002}
}
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being developed to demonstrate the effectiveness of specific artificial intelligence approaches to intrusion detection within a high performance computing (HPC) architecture. It is an update of previously reported research. The techniques being investigated include both neural networks and data mining techniques that use fuzzy logic including fuzzy association rules, fuzzy frequent episodes, and fuzzy… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 33 references

FuzzyCLIPS version 6.04 user's guide

  • R. Orchard
  • Knowledge System Laboratory, National Research…
  • 1995
Highly Influential
5 Excerpts

A comparison of input representations in neural networks: A case study in intrusion detection

  • Liu, Zhen, German Florez, Susan M. Bridges
  • Proceedings of the 2002 International Joint…
  • 2002
3 Excerpts

An pimproved algorithm for fuzzy data mining for intrusion detection

  • Florez, German, Susan M. Bridges, Rayford B. Vaughn
  • Proceedings of the 2002 North American Fuzzy…
  • 2002
1 Excerpt

Vaughn . An pimproved algorithm for fuzzy data mining for intrusion detection

  • German Florez, Susan M. Bridges, B. Rayford
  • Proceedings of the 2002 North American Fuzzy…
  • 2002

Similar Papers

Loading similar papers…