WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/14879,
	  title     = {Network Anomaly Detection using Soft Computing},
	  author    = {Surat Srinoy and  Werasak Kurutach and  Witcha Chimphlee and  Siriporn Chimphlee},
	  country	= {},
	  institution	= {},
	  abstract     = {One main drawback of intrusion detection system is the
inability of detecting new attacks which do not have known
signatures. In this paper we discuss an intrusion detection method
that proposes independent component analysis (ICA) based feature
selection heuristics and using rough fuzzy for clustering data. ICA is
to separate these independent components (ICs) from the monitored
variables. Rough set has to decrease the amount of data and get rid of
redundancy and Fuzzy methods allow objects to belong to several
clusters simultaneously, with different degrees of membership. Our
approach allows us to recognize not only known attacks but also to
detect activity that may be the result of a new, unknown attack. The
experimental results on Knowledge Discovery and Data Mining-
(KDDCup 1999) dataset.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {1},
	  number    = {9},
	  year      = {2007},
	  pages     = {2866 - 2870},
	  ee        = {https://publications.waset.org/pdf/14879},
	  url   	= {https://publications.waset.org/vol/9},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 9, 2007},
	}