2017
DOI: 10.1007/s00500-017-2856-4
|View full text |Cite
|
Sign up to set email alerts
|

A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems

Abstract: Intrusion detection systems are devoted to monitor a network with aims at finding and avoiding anomalous events. In particular, we focus on misuse detection systems, which are trained to identify several known types of attacks. These can be unauthorized accesses, or denial of service attacks, among others. Whenever it scans a trace of a suspicious event, it is programmed to trigger an alert and/or to block this dangerous access to the system. Depending on the security policies of the network, the administrator… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(19 citation statements)
references
References 37 publications
0
18
0
1
Order By: Relevance
“…More specifically, for each dataset, we provide the confusion matrix derived from the testing process of CFS-BA-Ensemble, and compare the performance of the proposed algorithm with no feature selection and some state-of-the-art methods in terms of several detection metrics, including Accuracy (Acc), precision, Detection Rate (DR), F-Measure, Attack Detection Rate (ADR), and False Alarm Rate (FAR). The mathematical calculations of the utilized evaluation metrics are explained in [25].…”
Section: Resultsmentioning
confidence: 99%
“…More specifically, for each dataset, we provide the confusion matrix derived from the testing process of CFS-BA-Ensemble, and compare the performance of the proposed algorithm with no feature selection and some state-of-the-art methods in terms of several detection metrics, including Accuracy (Acc), precision, Detection Rate (DR), F-Measure, Attack Detection Rate (ADR), and False Alarm Rate (FAR). The mathematical calculations of the utilized evaluation metrics are explained in [25].…”
Section: Resultsmentioning
confidence: 99%
“…In [106], Elhag et al combine a multi-objective evolutionary algorithm and fuzzy association rule learning to extract a more compact and informative rule set in comparison with other similar rule learning algorithms. The so-called multi-objective evolutionary fuzzy system can be trained using different performance metrics as objectives to adapt to user's requirement in accordance with detection trade-offs, and hence is better suited for its individual applications.…”
Section: Association Rule Learning Based Idsmentioning
confidence: 99%
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
“…Fuzzy Logic based techniques found best in detection of intrusion for as compared to Data Mining, K-Map [21], MLP [25][26][27][28][29][30], Random Forest [25][26][27][28][29][30], SVM [32,33], Neural Network [31][32][33] and dimensionality reduction [35][36][37].…”
Section: B Related Workmentioning
confidence: 99%