Research Article
Hybrid Network Defense Model Based on Fuzzy Evaluation
Table 1
Types of intrusion.
| Category | Type | Activities |
| 0 | Normal | Normal | 1 | Probe | Probes on system vulnerabilities, for example, port scans | 2 | DoS (Denial-of-Service) | DoS attacks, for example, SYN flooding | 3 | R2L (Remote-to-Local) | Unauthorized access by remote machine, for example, password guessing | 4 | U2R (User-to-Root) | Unauthorized access by locally managed accounts, for example, buffer overflow attacks |
|
|