Network Intrusion Detection System using Fuzzy Logic

Intrusion Detection System (IDS) is used to identify abnormal activities, to monitor events occurring in a computer system and analysing them as whether attack or intrusion should occurred. Most of the organizations have become used because more information and data is stored and process on network based system various data mining and machine learning technique. In the proposed system, we have design fuzzy logic based system for monitoring the intrusion activities. For this proposed system we adapt intrusion detection dataset from KDD Cup 99 dataset.

[1]  Marcos M. Campos,et al.  Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g , 2005, Fourth International Conference on Machine Learning and Applications (ICMLA'05).

[2]  Kuldip K. Paliwal,et al.  Intrusion detection using text processing techniques with a kernel based similarity measure , 2007, Comput. Secur..

[3]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[4]  Qiang Wang,et al.  A clustering algorithm for intrusion detection , 2005, SPIE Defense + Commercial Sensing.

[5]  Jian Pei,et al.  Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[6]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[7]  Reuven R. Levary,et al.  An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.

[8]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[9]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[10]  Susan M. Bridges,et al.  Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .

[11]  Jingtao Yao,et al.  A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.

[12]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[13]  C. Lucas,et al.  Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..

[14]  Mohammad Saniee Abadeh,et al.  Computer Intrusion Detection Using an Iterative Fuzzy Rule Learning Approach , 2007, 2007 IEEE International Fuzzy Systems Conference.

[15]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[16]  I. Ramesh Babu Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms , 2008 .

[17]  Abdolreza Mirzaei,et al.  Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..

[18]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[19]  Pakkurthi Srinivasu,et al.  Approaches and Data Processing Techniques for Intrusion Detection Systems , 2009 .

[20]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[21]  R. G. M. Helali Data Mining Based Network Intrusion Detection System: A Survey , 2008, TeNe.

[22]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[23]  Huang Hao,et al.  An Ensemble Approach to Intrusion Detection Based on Improved Multi-Objective Genetic Algorithm , 2007 .

[24]  Alma Husagic Selman Intrusion Detection System using Fuzzy Logic , 2013, SOCO 2013.

[25]  Zhongzhi Shi,et al.  Network Anomalous Intrusion Detection using Fuzzy-Bayes , 2006, Intelligent Information Processing.

[26]  Siti Mariyam Shamsuddin,et al.  RESEARCH ISSUES IN ADAPTIVE INTRUSION DETECTION , 2006 .

[27]  Kenichi Yoshida,et al.  Entropy based intrusion detection , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).

[28]  Norbik Bashah Idris,et al.  Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.

[29]  Venu Govindaraju,et al.  Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.

[30]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[31]  Francisco Herrera,et al.  Ten years of genetic fuzzy systems: current framework and new trends , 2004, Fuzzy Sets Syst..

[32]  Rebecca Gurley Bace,et al.  Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[33]  Anna Sperotto,et al.  Flow-based intrusion detection , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[34]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[35]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[36]  Nivedita Naidu,et al.  An Effective Approach to Network Intrusion Detection System using Genetic Algorithm , 2010 .

[37]  Taeshik Shon,et al.  SVM Approach with a Genetic Algorithm for Network Intrusion Detection , 2005, ISCIS.