Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems

Risk assessment is often done by human experts, because there is no exact and mathematical solution to the problem. Usually the human reasoning and perception process cannot be expressed precisely. This paper propose a light weight risk assessment system based on an Hierarchical Takagi-Sugeno model designed using evolutionary algorithms. Performance comparison is done with neuro-fuzzy and genetic programming methods. Empirical results indicate that the techniques are robust and suitable for developing light weight risk assessment models, which could be integrated with intrusion detection and prevention systems.

[1]  Michael O'Neill,et al.  Grammatical Evolution: Evolving Programs for an Arbitrary Language , 1998, EuroGP.

[2]  Thomas Peltier,et al.  Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital , 2006 .

[3]  Václav Snásel,et al.  Programming Risk Assessment Models for Online Security Evaluation Systems , 2009, 2009 11th International Conference on Computer Modelling and Simulation.

[4]  Carlos Martín-Vide,et al.  Evolutionary Design of Intrusion Detection Programs , 2007, Int. J. Netw. Secur..

[5]  Svein J. Knapskog,et al.  Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).

[6]  Václav Snásel,et al.  Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[7]  Ajith Abraham,et al.  Evolving Intrusion Detection Systems , 2006, Genetic Systems Programming.

[8]  Svein J. Knapskog,et al.  HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).

[9]  Bo Yang,et al.  Automatic Design of Hierarchical Takagi–Sugeno Type Fuzzy Systems Using Evolutionary Algorithms , 2007, IEEE Transactions on Fuzzy Systems.

[10]  Wolfgang Banzhaf,et al.  Explicit Control of Diversity and Effective Variation Distance in Linear Genetic Programming , 2002, EuroGP.

[11]  Douglas J. Landoll,et al.  The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments , 2005 .

[12]  Ajith Abraham,et al.  MEPIDS: Multi-Expression Programming for Intrusion Detection System , 2005, IWINAC.