Research Article

A Novel Method for Network Intrusion Detection

Table 1

Correspondence between network connection dataset and objects, attributes, and conditions in the fuzzy triadic background.

Internet connectionBlurred triadic background

Network connection packetObjects (O)
Network connection characteristicsAttributes (A)
Types of network intrusions (Benign, Brute Force, Botnet, DDoS, DoS, infiltration, SQL injection, and Web Attacks)Conditions (C)