2020
DOI: 10.1016/j.asoc.2020.106301
|View full text |Cite
|
Sign up to set email alerts
|

A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
65
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 131 publications
(65 citation statements)
references
References 85 publications
0
65
0
Order By: Relevance
“…Using collected or extracted data by statistical means to detect anomalies can lead to significant errors. In addition, there is no clear boundary between what is abnormal or usual behavior [48] [49]. In this sense, instead of using a hard threshold like classical classification, we used fuzzy logic to provide the recognition of network threats.…”
Section: B Ais Detection Modulementioning
confidence: 99%
See 1 more Smart Citation
“…Using collected or extracted data by statistical means to detect anomalies can lead to significant errors. In addition, there is no clear boundary between what is abnormal or usual behavior [48] [49]. In this sense, instead of using a hard threshold like classical classification, we used fuzzy logic to provide the recognition of network threats.…”
Section: B Ais Detection Modulementioning
confidence: 99%
“…A Fuzzy Inference System aims to generate an output value supported by fuzzy logic on a given input. It assigns values ranging from 0 to 1 [50] to provide a rational analysis in an environment that has no precise information or incomplete ones [48], as the network traffic analysis. The first step is to fuzzify the input through a membership function, creating a fuzzy set.…”
Section: B Ais Detection Modulementioning
confidence: 99%
“…K-nearest neighbors (KNN): It is an algorithm that calculates and orders the distance from new data to the existing one, classifying this input according to the frequency of the labels of the K-nearest ones. This distance is usually measured by the Euclidian norm presented in Equation (1). For the correct adjustment of this method [36], a correct value of the number of neighbors considered is essential.…”
Section: Machine Learning Algorithms Under Studymentioning
confidence: 99%
“…This process is, traditionally, static and linked to the rules or algorithms used for detecting cyberattacks. Nevertheless, this static process is difficult to adapt to the detection of new types of attacks because it implies updating it with new rules in the cases of signature-based IDS [1], or the re-training of the detection model in the case of anomaly-based IDS [2]. Specifically, anomaly-based IDS are related directly to the application of machine learning (ML) techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Detection is the process of monitoring events that occur in a computer system or network and analyzing them to find signs of accidents. These incidents can be imminent violations or threats to security work policies, accepted policies in the use of the system, or security standards 4 . Influence detection systems focus on identifying possible incidents, incidental information about them, trying to stop them, and reporting them to security managers.…”
Section: Introductionmentioning
confidence: 99%