A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems

This paper describes a framework for implementing intrusion detection systems using fuzzy logic. A fuzzy data-mining algorithm is used to extract fuzzy rules for the inference engine. The modular architecture is implemented using the Java expert system shell (Jess) and the FuzzyJess toolkit developed by Sandia National Laboratories and the National Research Council of Canada respectively. Experimental results for a hybrid prototype system using anomaly-based and fuzzy signatures are provided using data sets from MIT Lincoln Laboratory

[1]  Susan M. Bridges,et al.  Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..

[2]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[3]  Sergei Ovchinnikov,et al.  Fuzzy Sets and Secure Computer Systems , 1994, Proceedings New Security Paradigms Workshop.

[4]  Richard P. Lippmann,et al.  1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .

[5]  Salvatore J. Stolfo,et al.  Data mining-based intrusion detectors: an overview of the columbia IDS project , 2001, SGMD.

[6]  Heikki Mannila,et al.  Discovering Generalized Episodes Using Minimal Occurrences , 1996, KDD.

[7]  Lotfi A. Zadeh,et al.  MAKING COMPUTERS THINK LIKE PEOPLE , 1984 .

[8]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[9]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[10]  Jacinth Salome,et al.  Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .

[11]  Heikki Mannila,et al.  Discovering Frequent Episodes in Sequences , 1995, KDD.

[12]  Ramakrishnan Srikant,et al.  Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.

[13]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[14]  E. J. Friedman-hill,et al.  Jess, the Java expert system shell , 1997 .

[15]  Man Hon Wong,et al.  Mining fuzzy association rules in databases , 1998, SGMD.

[16]  Jaideep Srivastava,et al.  Data Mining for Network Intrusion Detection , 2002 .

[17]  Salvatore J. Stolfo,et al.  Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.

[18]  Lotfi A. Zadeh,et al.  The concept of a linguistic variable and its application to approximate reasoning-III , 1975, Inf. Sci..

[19]  Robert Orchard,et al.  Fuzzy Reasoning in JESS: The Fuzzyj Toolkit and Fuzzyjess , 2001, ICEIS.

[20]  Hilary H. Hosmer,et al.  Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.