A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

Abstract Organizations that benefit from information technologies are vulnerable to various attacks and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of defense which in conjunction with firewalls and other security components are applied to deal with intrusions and unauthorized misbehaviors. Misuse detection is one of the main branches of the intrusion detection which intends to prevent known security attacks regarding their previously known signatures. This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques to deal with different kinds of intrusions. For this purpose, it first presents the key points and knowledge about intrusion detection and then classifies the fuzzy misuse detection approaches regarding their applied fuzzy techniques and algorithms. Then, it illustrates the major contributions of the fuzzy IDS schemes and illuminates their merits and limitations. Besides, in each section, the comparison of their applied datasets, performance evaluation factors, feature extraction methods as well as the type of fuzzy logic controller (FLC) and membership functions are provided. Finally, the concluding issues and the directions for future researches are highlighted.

[1]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[2]  V. Valli Kumari,et al.  Feature Selection Using Relative Fuzzy Entropy and Ant Colony Optimization Applied to Real-time Intrusion Detection System , 2016 .

[3]  Shahram Babaie,et al.  A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.

[4]  Ahmad Akbari,et al.  Improving Detection Rate in Intrusion Detection Systems Using FCM Clustering to Select Meaningful Landmarks in Incremental Landmark Isomap Algorithm , 2011 .

[5]  Malathi Arunachalam,et al.  Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection , 2015 .

[6]  Dervis Karaboga,et al.  Adaptive network based fuzzy inference system (ANFIS) training approaches: a comprehensive survey , 2018, Artificial Intelligence Review.

[7]  Chien-Sing Lee,et al.  Policy-enhanced ANFIS model to counter SOAP-related attacks , 2012, Knowl. Based Syst..

[8]  Taufik Abrão,et al.  Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic , 2018, Expert Syst. Appl..

[9]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[10]  Mohammad Masdari,et al.  Towards workflow scheduling in cloud computing: A comprehensive analysis , 2016, J. Netw. Comput. Appl..

[11]  Francisco Herrera,et al.  A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems , 2019, Soft Comput..

[12]  Mohammad Masdari,et al.  An overview of virtual machine placement schemes in cloud computing , 2016, J. Netw. Comput. Appl..

[13]  Jiankun Hu,et al.  Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..

[14]  Marimuthu Palaniswami,et al.  Evolving Fuzzy Rules for Anomaly Detection in Data Streams , 2015, IEEE Transactions on Fuzzy Systems.

[15]  Przemyslaw Kudlacik,et al.  Fuzzy approach for intrusion detection based on user’s commands , 2016, Soft Comput..

[16]  Mohammad Masdari,et al.  A survey and taxonomy of DoS attacks in cloud computing , 2016, Secur. Commun. Networks.

[17]  Jinping Liu,et al.  Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection , 2020, Expert Syst. Appl..

[18]  Dervis Karaboga,et al.  An adaptive and hybrid artificial bee colony algorithm (aABC) for ANFIS training , 2016, Appl. Soft Comput..

[19]  Szilveszter Kovács,et al.  Intrusion Detection Mechanism Using Fuzzy Rule Interpolation , 2019, ArXiv.

[20]  Neenavath Veeraiah,et al.  Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule , 2019, Wirel. Networks.

[21]  Vijay Kumar Jha,et al.  Fuzzy min–max neural network and particle swarm optimization based intrusion detection system , 2017 .

[22]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[23]  Vasilios Katos,et al.  Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..

[24]  Xing Li,et al.  A dynamic artificial immune-based intrusion detection method using rough and fuzzy set , 2013 .

[25]  Maghsoud Abbaspour,et al.  Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller , 2012, Int. J. Netw. Secur..

[26]  Mohammad Masdari,et al.  Key management in wireless Body Area Network: Challenges and issues , 2017, J. Netw. Comput. Appl..

[27]  Giancarlo Fortino,et al.  Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..

[28]  Ping Wang,et al.  A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks , 2018, Adv. Fuzzy Syst..

[29]  Shalini Batra,et al.  Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection , 2017, Comput. Electr. Eng..

[30]  Huwaida Tagelsir Elshoush,et al.  Alert correlation in collaborative intelligent intrusion detection systems - A survey , 2011, Appl. Soft Comput..

[31]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[32]  Suvasini Panigrahi,et al.  A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system , 2015, Int. J. Reason. based Intell. Syst..

[33]  Arputharaj Kannan,et al.  A Novel Weighted Fuzzy C –Means Clustering Based on Immune Genetic Algorithm for Intrusion Detection , 2012 .

[34]  Mohammad Masdari,et al.  Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks , 2013, J. Netw. Comput. Appl..

[35]  Hao Wang,et al.  Intrusion Detection Based on Parallel Intelligent Optimization Feature Extraction and Distributed Fuzzy Clustering in WSNs , 2018, IEEE Access.

[36]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[37]  Francisco Herrera,et al.  On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..

[38]  Srinivasan Ramakrishnan,et al.  Attack’s Feature Selection-Based Network Intrusion Detection System Using Fuzzy Control Language , 2017, Int. J. Fuzzy Syst..

[39]  Hong Zhang,et al.  Intrusion Detection Based on Improvement of Genetic Fuzzy C-Means Algorithm , 2012 .

[40]  Mohammad Masdari,et al.  A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems , 2017, J. Netw. Comput. Appl..

[41]  Sanjeev Jain,et al.  Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network , 2017 .

[42]  Ning Wang,et al.  FCM technique for efficient intrusion detection system for wireless networks in cloud environment , 2017, Comput. Electr. Eng..

[43]  Giovanni Acampora,et al.  Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems , 2011, Soft Computing.

[44]  Altyeb Altaher,et al.  An improved Android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (EHNFC) and permission-based features , 2017, Neural Computing and Applications.

[45]  N. Jeyanthi,et al.  Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification , 2018 .

[46]  F. Herrera,et al.  Evolutionary Fuzzy Systems: A Case Study for Intrusion Detection Systems , 2018, Studies in Computational Intelligence.

[47]  Manel Guerrero Zapata,et al.  A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.

[48]  M. Thenmozhi,et al.  Intrusion detection system based on GA‐fuzzy classifier for detecting malicious attacks , 2019, Concurr. Comput. Pract. Exp..