2015 XVIII International Conference on Soft Computing and Measurements (SCM) 2015
DOI: 10.1109/scm.2015.7190470
|View full text |Cite
|
Sign up to set email alerts
|

Network attacks detection using fuzzy logic

Abstract: The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc. Every type of menace is characterized by a vector of fuzzy values describing the network state when this menace is present. These vectors constitute the fuzzy ru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…These parameters are used for calculating a jamming index (JI) to indicate the jamming level (high, medium or low). In the same way, Levonevskiy et al have proposed a method that based on a vector of fuzzy values to detect DDoS attacks [28] by monitoring the network characteristics as packet size and ratio of received traffic to outgoing traffic. The theory of fuzzy logic is implemented also [29] to predict exhaustion attacks over the IEEE 802.15.4 MAC layer, using FCM clustering.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…These parameters are used for calculating a jamming index (JI) to indicate the jamming level (high, medium or low). In the same way, Levonevskiy et al have proposed a method that based on a vector of fuzzy values to detect DDoS attacks [28] by monitoring the network characteristics as packet size and ratio of received traffic to outgoing traffic. The theory of fuzzy logic is implemented also [29] to predict exhaustion attacks over the IEEE 802.15.4 MAC layer, using FCM clustering.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, some method as [14], [19], [27], [28] require a complicated calculation on the nodes, which is costly in terms of energy. The technique [27] makes the member of nodes send periodically data for checking the values of the four inputs parameters (BPR, PDR, RSS, and CCA).…”
Section: Pros and Cons Of Proposed Ids For Wbanmentioning
confidence: 99%