TY - GEN
T1 - Information fusion techniques for network intrusion detection
AU - Ye, Nong
AU - Giordano, J.
AU - Feldman, J.
AU - Zhong, Qiu
N1 - Funding Information:
This effort is sponsored by AFOSR under grant number F49620-98-1-0257, and by AFRL,A ir Force Material Command, USAF, under agreement number F30602-98-2-0005. The U.S. government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of AFOSR, AFRL, or the U.S. Government.
Publisher Copyright:
© 1998 IEEE.
PY - 1998
Y1 - 1998
N2 - Many intrusion detection techniques produce values of indications and warning (IW) that account for only isolated effects of computer network intrusions. To address interactive effects of network intrusions involving coordinated actions, it is necessary to correlate and fuse IW values for providing an accurate assessment of network intrusions. Information fusion techniques are presented.
AB - Many intrusion detection techniques produce values of indications and warning (IW) that account for only isolated effects of computer network intrusions. To address interactive effects of network intrusions involving coordinated actions, it is necessary to correlate and fuse IW values for providing an accurate assessment of network intrusions. Information fusion techniques are presented.
UR - http://www.scopus.com/inward/record.url?scp=84949856103&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84949856103&partnerID=8YFLogxK
U2 - 10.1109/IT.1998.713395
DO - 10.1109/IT.1998.713395
M3 - Conference contribution
AN - SCOPUS:84949856103
T3 - 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998
SP - 117
EP - 120
BT - 1998 IEEE Information Technology Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1998 IEEE Information Technology Conference, IT 1998
Y2 - 3 September 1998
ER -