The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05.
DOI: 10.1109/fuzzy.2005.1452414
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems

Abstract: This paper describes a framework for implementing intrusion detection systems using fuzzy logic. A fuzzy datamining algorithm is used to extract fuzzy rules for the inference engine. The modular architecture is implemented using the Java Expert System Shell (Jess) and the FuzzyJess toolkit developed by Sandia National Laboratories and the National Research Council of Canada respectively. Experimental results for a hybrid prototype system using anomaly-based and fuzzy signatures are provided using data sets fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…Commonly employed methods are generating rules based on the histogram of attribute values [10,11], or based on partition of overlapping areas [10,11,184], or based on fuzzy implication tables [291], or by fuzzy decision trees [194], or by association rules [84] or by SVMs [279]. Due to the rapid development of computational intelligence, approaches with learning and adaptive capabilities have been widely used to automatically construct fuzzy rules.…”
Section: Fuzzy Misuse Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Commonly employed methods are generating rules based on the histogram of attribute values [10,11], or based on partition of overlapping areas [10,11,184], or based on fuzzy implication tables [291], or by fuzzy decision trees [194], or by association rules [84] or by SVMs [279]. Due to the rapid development of computational intelligence, approaches with learning and adaptive capabilities have been widely used to automatically construct fuzzy rules.…”
Section: Fuzzy Misuse Detectionmentioning
confidence: 99%
“…Florez et al [94] later described an algorithm for computing the similarity between two fuzzy association rules based on prefix trees, so better running time and accuracy were achieved. El-Semary et al compared the test data samples against fuzzy association rules directly by a fuzzy inference engine [84].…”
Section: Fuzzy Anomaly Detectionmentioning
confidence: 99%
“…Since 1995 several classification techniques have been adopted for intrusion detection, including neural networks [8], genetic algorithms [9], state transition [10], immune system [11], Bayesian network [12], fuzzy logic [13], hidden Markov models [8], decision tree [14]. A comprehensive study on anomaly-based IDS has been provided in [26].…”
Section: Related Workmentioning
confidence: 99%
“…Qin [17] used data mining to profile normal network behavior. Bridges and Vaughn [18], Dickerson et al [10,11], Luo and Bridges [16] used fuzzy logic and data mining to model normal network behavior, and Elsemary et al [13][14][15] use fuzzy association rules to model both network behavior and attack signature but their model is neither scalable nor distributed. Last, but not least, Ming-Yang Su [19] uses the frequency episode rules implemented by finite state machines to design a real-time network-based intrusion prevention system for Probe/Exploit intrusion.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly-based systems employ various techniques including artificial intelligence [3], statistical analysis [2], machine learning [7] and data mining [8,9]. Recently, fuzzy logic together with data mining IDSs [10][11][12][13][14][15][16] have been successfully used to identify anomalies. Anomaly detection systems are capable of detecting attacks for which well-defined patterns do not exist (such as new attacks or variations of existing attacks).…”
Section: Introductionmentioning
confidence: 99%