Intelligent intrusion detection system

An intrusion detection system (IDS) entails a sophisticated decision process, which involves a number of factors implicating dizziness and vagueness. We propose a new approach to the development of intelligent IDSs for misuse detection, based on pattern recognition and fuzzy classification principles. A new method for the development of fuzzy intrusion classifiers is proposed, which extracts fuzzy classification rules from numerical data, applying a heuristic learning procedure. The proposed approach to synthesis of intelligent IDSs is tested experimentally with real data. The experimental results show that the fuzzy intrusion classifier successfully detects and classifies various types of security attacks.

[1]  Jerry M. Mendel,et al.  Generating fuzzy rules by learning from examples , 1992, IEEE Trans. Syst. Man Cybern..

[2]  Hilary H. Hosmer,et al.  Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.

[3]  Shigeo Abe,et al.  A method for fuzzy rules extraction directly from numerical data and its application to pattern classification , 1995, IEEE Trans. Fuzzy Syst..

[4]  Sumit Ghosh,et al.  A fundamental framework for network security , 1997 .

[5]  A. Lekova,et al.  Method for fuzzy rules extraction from numerical data , 1997, Proceedings of 12th IEEE International Symposium on Intelligent Control.

[6]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[7]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[8]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[9]  Erland Jonsson,et al.  Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.

[10]  S. V. Raghavan,et al.  Intrusion detection through learning behavior model , 2001, Comput. Commun..

[11]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[12]  D. Dasgupta,et al.  Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[13]  Yun-Tao Zhang,et al.  A fuzzy comprehensive evaluation based distributed intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[14]  Sung-Bae Cho,et al.  Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.

[15]  Ingoo Han,et al.  The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..

[16]  M. Gordeev Intrusion Detection: Techniques and Approaches , 2003 .

[17]  Rebecca Gurley Bace,et al.  Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..