Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Figure 2 Architecture of NeGPAIM (Botha et al., 2002). As shown in Fig. 2 (Botha et al., 2002), NeGPAIM is based on hybrid technique combining two low level components including fuzzy logic for misuse detection and neural networks for anomaly detection, and one high level component which is a central engine analyzing outcome of two low level components. It is an effective model, which does not require dynamic updates of rules. Gong. et al. (2005) used seven 1 features (Duration, Protocol, Source_port, Destination_port, Source_IP, Destination_IP, Attack_- name) of captured packet. They used support confidence based