2012
DOI: 10.1007/978-3-642-25507-6_13
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…This step requires knowledge of the system and its performance, as well as the purpose of modeling. For black box modeling, the input signals of the system are important sources of information, so in this type of system, accuracy is very important at this stage (Sabzalian et al 2019 ; Failed 2012 ). The excitation signal must be such that it excites all system modes and does not damage the system.…”
Section: The Principles Of System Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…This step requires knowledge of the system and its performance, as well as the purpose of modeling. For black box modeling, the input signals of the system are important sources of information, so in this type of system, accuracy is very important at this stage (Sabzalian et al 2019 ; Failed 2012 ). The excitation signal must be such that it excites all system modes and does not damage the system.…”
Section: The Principles Of System Identificationmentioning
confidence: 99%
“…In Sabzalian, et al 2019 , the application of T2F-NNs in control problem is investigated and an adaptive controller is designed and its robustness against uncertainty is shown. In (Failed 2012 ), the application of fuzzy rough systems in intrude detection problem is studied and it is shown that by the use of fuzzy logic systems (FLSs) the accuracy is improved and the rate of false alarm is decreased. In (Kanimozhi 2019 ), a fuzzy prediction systems is designed and it is used for cancer prediction.…”
Section: Introductionmentioning
confidence: 99%
“…A device utilizing the system has been applied to various surely understood intrusion detection informational collections to distinguish how every segment adds to the general objectives of connection. Jaisankar, N et al, (2012) [19] proposed another wise specialist based IDS utilizing Fuzzy Rough Set based exception detection and Fuzzy Rough set based SVM. In that proposed model they presented two distinctive canny operators to be specific element determination specialist to choose the necessary list of capabilities utilizing fuzzy unpleasant sets and basic leadership operator director for settling on an official conclusion.…”
Section: Related Workmentioning
confidence: 99%
“…Intelligent IDSs are the ones considered to be intelligent computer programs situated in either a host or a network which analyzes the environment and acts flexibly to achieve higher detection accuracy [4,5]. These programs compute the actions to be performed on the environment both by learning the environment and by firing rules of inference [6].…”
Section: Intelligent Intrusion Detection Systemsmentioning
confidence: 99%
“…Then the distance between any two classes of patterns are computed from the R classes using the Minkowski distance. According this method, the distance between two points P ¼ x 1 ; x 2 ; x 3 ; …; x n ð Þand Q ¼ y 1 ; y 2 ; y 3 ; …; y n ð Þ ∈ R n ð4Þ is given by the formula given in Equation 5.…”
Section: Enhanced Multiclass Support Vector Machinementioning
confidence: 99%