Research Article

Hybrid Network Defense Model Based on Fuzzy Evaluation

Table 1

Types of intrusion.

CategoryTypeActivities

0NormalNormal
1ProbeProbes on system vulnerabilities, for example, port scans
2DoS (Denial-of-Service)DoS attacks, for example, SYN flooding
3R2L (Remote-to-Local)Unauthorized access by remote machine, for example, password guessing
4U2R (User-to-Root)Unauthorized access by locally managed accounts, for example, buffer overflow attacks