Research Article
A Novel Method for Network Intrusion Detection
Table 1
Correspondence between network connection dataset and objects, attributes, and conditions in the fuzzy triadic background.
| | Internet connection | Blurred triadic background |
| | Network connection packet | Objects (O) | | Network connection characteristics | Attributes (A) | | Types of network intrusions (Benign, Brute Force, Botnet, DDoS, DoS, infiltration, SQL injection, and Web Attacks) | Conditions (C) |
|
|