A Comparative study of Computational Intelligence in Computer Security and Forensics

نویسندگان

  • Sulaiman Al amro
  • Khalid Aldrawiesh
  • Ajlan Al-Ajlan
چکیده

Because of the growing reliance that corporations and government agencies place on their computer networks, the significance of defending these systems from attack cannot be underestimated. Computer security and forensics are crucial in protecting systems from attack or from unauthorized access that might have undesirable consequences, and can help to ensure that a network infrastructure will remain integrated and survive. The use of high quality techniques within a system will provide a better protected system, and will offer clues that might help in any criminal investigation. Techniques such as artificial neural networks, fuzzy logic, and evolutionary computing can be used to help deal with issues associated with computer security and forensics. This paper concentrates on the use of neural networks, fuzzy logic, and evolutionary computation in computer security and forensics. It also examines the hybrids of these three techniques, and considers how they can be applied to computer security and forensics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multicast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach

Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Sports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey

In the current world, sports produce considerable statistical information about each player, team, games, and seasons. Traditional sports science believed science to be owned by experts, coaches, team managers, and analyzers. However, sports organizations have recently realized the abundant science available in their data and sought to take advantage of that science through the use of data mini...

متن کامل

Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework

Computer Forensics has grown rapidly in recent years. The current computer forensic investigation paradigm is laborious and requires significant expertise on the part of the investigators. This paper proposes a highly automatic and efficient framework to provide the Case-Relevance information, by binding computer intelligence technology to the current computer forensic framework. Computer intel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011