International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. 2004
DOI: 10.1109/itcc.2004.1286428
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive neuro-fuzzy intrusion detection systems

Abstract: The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, Artificial Neural Networks and Fuzzy Inference System, are used to design an Intrusion Detection System. SNORT is used to perform real time traffic analysis and packet logging on IP network during the training phase of the system. Then a signature pattern database is constructed using pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
39
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(41 citation statements)
references
References 5 publications
0
39
0
Order By: Relevance
“…One of the seminal works on adaptive IDS was done by Lee et al (2000) started with rule-based adaptive IDS. The traditional association rule mining proposed by Lee et al (2000) was replaced by recent rulemining techniques such as Fuzzy Inference and Artificial Neural Network as done by Chavan et al (2004) and Liao et al (2007) and Genetic Algorithm and Learning Classifier System by Shafi and Abbas (2009). Dynamic updating strategy is pursued until now.…”
Section: (D) Manual Updatingmentioning
confidence: 99%
“…One of the seminal works on adaptive IDS was done by Lee et al (2000) started with rule-based adaptive IDS. The traditional association rule mining proposed by Lee et al (2000) was replaced by recent rulemining techniques such as Fuzzy Inference and Artificial Neural Network as done by Chavan et al (2004) and Liao et al (2007) and Genetic Algorithm and Learning Classifier System by Shafi and Abbas (2009). Dynamic updating strategy is pursued until now.…”
Section: (D) Manual Updatingmentioning
confidence: 99%
“…Firewalls were made in order to protect the networks from attacks that come from outside world, but they do not obliterate any intrusion coming from inside the network. Intrusion Detection Systems (IDS), on the other hand, monitor networking packets in order to prevent any form of computer attacks from within the network [1][2][3][4]. This work focuses on IDS, since existing commercial IDS's offer wide window for improvements.…”
Section: Introductionmentioning
confidence: 99%
“…In general, IDSs may be designed to perform misuse detection or anomaly detection [1,5]. In misuse detection, all known abnormal behavior is defined and the system is trained to recognize it.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several types of intrusion detection systems are in use [1], [2], [3], [4], [5], [6]. Configuring an IDS to detect internal attacks can be difficult.…”
Section: Introductionmentioning
confidence: 99%