Intrusion Detection Systems 2011
DOI: 10.5772/14130
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Based on the architecture, an IDS can be classified into three types: host-based IDS, network-based IDS, and hybrid IDS. Where the host-based IDS works by analyze data from monitored hosts, network-based IDS analyze from network traffic, and hybrid IDS is the combination of both [6], [7].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the architecture, an IDS can be classified into three types: host-based IDS, network-based IDS, and hybrid IDS. Where the host-based IDS works by analyze data from monitored hosts, network-based IDS analyze from network traffic, and hybrid IDS is the combination of both [6], [7].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The research classified into two categories, the first related with hybrid IDS, and two are associated with IDS for SQL injection attacks. In first category, the studies generally built hybrid IDS with a combination of network data packet and system activity logs, among others Shanmugam and Idris [7], Sharma and Chandel [17], and Yunmar [18]. Except of Yunmar research, the first category generally focused on analyze network based attacks, such as DoS, U2R, R2L, etc.…”
Section: Related Workmentioning
confidence: 99%
“…However with all these techniques there is a need of hybrid intrusion detection which can detect static as well as dynamic attacks i.e can detect attacks on host as well as on network. B. Shanmugam et al [5] proposed a hybrid IDS which is more accurate, low in false alarms, intelligent by using fuzzy mechanisms and not easily deceived by small variation. But the system crashed, as it could not withstand the traffic for more than three weeks without restarting.…”
Section: Related Workmentioning
confidence: 99%
“…Many machine learning based detection techniques are used for the host as well as the network based anomaly detection. Bayesian Networks are used to encode probabilistic relationships among the variables of interest and ability to incorporate prior knowledge and data [4], Whereas Neural Networks generalize from noisy, limited and incomplete data and have the potential to recognize future unseen patterns [5]. Fuzzy Logic is employed where reasoning is approximate rather than precise [4], [5].…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
See 1 more Smart Citation