Research Article
A Novel Method for Network Intrusion Detection
Table 1
Correspondence between network connection dataset and objects, attributes, and conditions in the fuzzy triadic background.
| Internet connection | Blurred triadic background |
| Network connection packet | Objects (O) | Network connection characteristics | Attributes (A) | Types of network intrusions (Benign, Brute Force, Botnet, DDoS, DoS, infiltration, SQL injection, and Web Attacks) | Conditions (C) |
|
|