With more and more intrusion techniques developed, it is not enough to protect network system only from a defender's perspective. Intrusion detection technology is a protection technology after the traditional protection techniques such as "firewall" and "encryption"; Intrusion Detection Systems (IDSs) watch the computer and network traffic for intrusive and suspicious activities. They not only detect the intrusion from the extranet hackers, but also the intranet users.This paper brings out a new approach that adopts the fuzzy-rule based technique to detect the SYN flooding attacks. Our model relies on the significant parameters of anomalous network packets and identifies the attacks with the use of a set of fuzzy rules. |