Adaptive neuro-fuzzy intrusion detection systems

被引:54
作者
Chavan, S
Shah, K
Dave, N
Mukherjee, S
Abraham, A
Sanyal, S
机构
来源
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS | 2004年
关键词
D O I
10.1109/ITCC.2004.1286428
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, Artificial Neural Networks and Fuzzy Inference System, are used to design an Intrusion Detection System. SNORT is used to perform real time traffic analysis and packet logging on IP network during the training phase of the system. Then a signature pattern database is constructed using protocol analysis and Neuro-Fuzzy learning method. Using 1998 DARPA Intrusion Detection Evaluation Data and TCP dump raw data, the experiments are deployed and discussed.
引用
收藏
页码:70 / 74
页数:5
相关论文
共 13 条
  • [1] Abraham A., 2001, Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence. 6th International Work-Conference on Artificial and Natural Neural Networks, IWANN 2001. Proceedings, Part I (Lecture Notes in Computer Science Vol. 2084), P269
  • [2] [Anonymous], METHODOLOGIES CONCEP
  • [3] BRIAN C, 2003, SNORT 2 0 INTRUSION
  • [4] Fausett L. V., 1993, FUNDAMENTALS NEURAL
  • [5] JONATHAN A, 1999, NETWORK MAGAZINE
  • [6] KAREN FK, 2001, NETWORK INTRUSION DE
  • [7] Lau C, 1991, NEURAL NETWORKS THEO
  • [8] EXPERIMENT IN LINGUISTIC SYNTHESIS WITH A FUZZY LOGIC CONTROLLER
    MAMDANI, EH
    ASSILIAN, S
    [J]. INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1975, 7 (01): : 1 - 13
  • [9] MARK C, 2002, INTRUSION SIGNATURES
  • [10] NETWORK INTRUSION DETECTION
    MUKHERJEE, B
    HEBERLEIN, LT
    LEVITT, KN
    [J]. IEEE NETWORK, 1994, 8 (03): : 26 - 41