Total views : 225

A Concept for Minimizing False Alarms and Security Compromise by Coupled Dynamic Learning of System with Fuzzy Logics

Affiliations

  • Department of CSE, St Peters University, Chennai - 600054, Tamil Nadu, India
  • Department of CSE, C. Abdul Hakeem College of Engineering and Technology, Anna University, Melvisharam, Vellore - 632509, Tamil Nadu, India

Abstract


Objectives: To develop a novel method of Intrusion Detection System (IDS) by coupled dynamic learning of system with Fuzzy logics for minimizing false alarms and security compromise of a system connected with internet. Method: When Intrusion Detection System (IDS) raise alarm based on assigned rules, there would be a possibility for too many false alarms. The degree of intrusion and subsequent alert are often depending on different situations. These situations are not unique for all systems hence; a global knowledge based filter rules fail to minimize false alarms. In this paper, a concept was proposed to solve this hazy and unclear cutoff rules derived from global knowledge, by self-learning and turning activity of system, towards the security issues from the analytical outcomes of behavioral patterns of network system. Findings: The use of fuzzy logic helps to smooth the sharp separation of normal and abnormal behaviors in network activity which adds further strength in minimizing false alarms and security compromise. This concept is illustrated and demonstrated using some familiar network behaviors for easy understanding of logics and mechanism of the proposed IDS model. Application/Improvements: This intelligence associated with fuzzy logic may be extended with more and more parameters for better efficiency in Intrusion Detection System (IDS).

Keywords

Anomaly Detection, Behavior Analysis, Fuzzy Logic, Fuzzy Score, Fuzzy Decision Module Intrusion-Detection System.

Full Text:

 |  (PDF views: 161)

References


  • Azarnivand A, Malekian A. Analysis of flood risk management strategies based on a group decision making process via interval-valued intuitionistic fuzzy numbers. Water Resources Management. 2016; 30(6):1903.
  • Boukezzi L, Bessissa L, Boubakeur A, Mahi D. Neural networks and fuzzy logic approaches to predict mechanical properties of XLPE insulation cables under thermal aging. Neural Computing and Applications. 2016; 1–14.
  • Cebi S, Ozkok M, Kafali M, Kahraman C. A fuzzy multiphase and multicriteria decision-making method for cutting technologies used in shipyards. International Journal of Fuzzy Systems. 2016; 18(2):198–211.
  • Chahal RK, Singh S. Fuzzy rule-based expert system for determining trustworthiness of cloud service providers. International Journal of Fuzzy Systems. 2016; 1–17.
  • Ghalehsefidi NJ, Dehkordi MN. A hybrid algorithm based on heuristic method to preserve privacy in association rule mining. Indian Journal of Science and Technology. 2016 Jul; 9(27). DOI: 10.17485/ijst/2016/v9i27/97476.
  • Batkovskiy AM, Kalachikhin PA, Semenova EG, Telnov YF, Fomina AV. Economic-mathematical model and mathematical methods for substantiating the choice of the company innovation strategy. Indian Journal of Science and Technology. 2016 Jul; DOI: 10.17485/ijst/2016/v9i27/97662.
  • Das SK, Mandal T, Edalatpanah SA. A mathematical model for solving fully fuzzy linear programming problem with trapezoidal fuzzy numbers. Applied Intelligence. 2016; 1–11.
  • Di Maria F, Micale C, Contini S. A novel approach for uncertainty propagation applied to two different bio-waste management options. The International Journal of Life Cycle Assessment. 2016; 21(10):1529–37.
  • Revathi S, Malathi D. Intrusion detection based on fuzzy logic approach using simplified swarm optimization. International Journal of Computer Trends and Technology. 2014 Jul; 13(1):19–22.
  • Aishwarya S, Srinivasan N. Efficient intrusion alert reduction mechanism using fuzzy artmap. International Journal of Engineering and Technology. 2013 Apr; 5(2):820–8.
  • Shrivastava A, Baghel M, Gupta H. A review of intrusion detection technique by soft computing and data mining approach. International Journal of Advanced Computer Research. 2013 Sep; 3(12):224–8.
  • Bernal R, Karanik M, Peláez JI. Fuzzy measure identification for criteria coalitions using linguistic information. Soft Computing. 2016; 20(4): 1315–27.
  • Du X, Zhou K, Cui Y, Wang J, Zhang N, Sun W. Application of fuzzy Analytical Hierarchy Process (AHP) and Prediction-Area (P-A) plot for mineral prospectivity mapping: A case study from the Dananhu metallogenic belt, Xinjiang, NW China. Arabian Journal of Geosciences. 2016; 9(4):1.
  • Hosseini MM, Saberirad F, Davvaz B. Numerical solution of fuzzy differential equations by variational iteration method. International Journal of Fuzzy Systems. 2016; 18(5): 875–82.
  • Huang CM, Ghafoor Y, Huang YP, Liu SI. A dolphin herding inspired fuzzy data clustering model and its applications. International Journal of Fuzzy Systems. 2016; 18(2):299.
  • Kadji A, Lele C, Tonga M. Fuzzy prime and maximal filters of residuated lattices. Soft Computing. 2016; 1.
  • Kapoor A, Biswas KK, Hanmandlu M. An evolutionary learning based fuzzy theoretic approach for salient object detection. The Visual Computer 2016; 1.
  • Li B, Zhang H, Li Y. The Molds of Intuitionistic Fuzzy Value and Their Applications. International Journal of Fuzzy Systems 2016;18(2):284.
  • Liang M, Gao C, Zhang Z. A new genetic algorithm based on modified Physarum network model for bandwidth-delay constrained least-cost multicast routing. Natural Computing 2016; 1.
  • Liu Ht, Wang J, He Yl, Ashfaq RAR. Extreme learning machine with fuzzy input and fuzzy output for fuzzy regression. Neural Computing and Applications. 2016; 1.
  • Murugan S, Rajan MS. Fuzzy Based Anomaly Intrusion Detection System for Clustered WSN. Research Journal of Applied Sciences, Engineering and Technology 2015 Mar;9(9):760-9.
  • Sonawale S, Ade R. Intrusion detection system-via fuzzy artmap in addition with advance semi supervised feature selection. International Journal of Data Mining and Knowledge Management Process. 2015 May; 5(3):29–43.
  • Zhang F, Xu S. Multiple Attribute group decision making method based on utility theory under interval-valued intuitionistic fuzzy environment. Group Decision and Negotiation. 2016; 1.
  • Vyacheslavovich SP, Aleksandrovich KP. Multi-layer neural network auto encoders learning method, using regularization for invariant image recognition. Indian Journal of Science and Technology. 2016 Jun; 9(27). DOI: 10.17485/ijst/2016/v9i27/97704.
  • Nithya B, Sripriya P. Comparative analysis of symmetric cryptographic algorithms on .net platform. Indian Journal of Science and Technology. 2016 Jul; 9(27). DOI: 10.17485/ijst/2016/v9i27/86580.
  • Zhou KQ, Zain AM. Fuzzy petri nets and industrial applications: A review. Artificial Intelligence Review. 2016; 45(4):405.
  • Pagalnila V, Lalli M. Fuzzy based intrusion detection system for prediction of gray hole attack in manet. International Journal of Engineering Sciences and Research Technology. 2015 Aug; 4(8):581–9.
  • Tewatia R, Mishra A. Introduction to intrusion detection system review. International Journal of Scientific and Technology Research. 2015 May; 4(5):219–23.
  • Chaudhary A, Tiwari VN, Kumar A. Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks. BVICAM's International Journal of Information Technology. 2014 Jan; 6(1):690–6.
  • Kumar D, Mohan D. Performance enhancement of intrusion detection using neuro-fuzzy intelligent system. Indian Journal of Computer Science and Engineering. 2014 Oct; 5(5):186–9.
  • Jaisankar N, Ganapathy S, Kannan A. Intelligent intrusion detection system using fuzzy rough set based C4.5~algorithm. New York, NY, USA: ACM; 2012. p. 596–601.
  • R Jayadurga, Gunasundari R. Hybrid of statistical and spectral texture features for vehicle object classification system. Indian Journal of Science and Technology. 2016 Jul; 9(27). DOI: 10.17485/ijst/2016/v9i27/90832.
  • Hilda JJ, Srimathi C, Bonthu B. A review on the development of big data analytics and effective data visualization techniques in the context of massive and multidimensional data. Indian Journal of Science and Technology. 2016 Jul; 9(27). DOI: 10.17485/ijst/2016/v9i27/88692.
  • Ramnaresh S, Shrivastava M. A Study of Various Intrusion Detection Model Based on Data Fusion, Neural Network and D-S Theory. International Journal of Advanced Computer Research. 2012 Sep;2(4):106-12.
  • Agravat M, Rao UP. Computer intrusion detection by twoobjective fuzzy genetic algorithm. Computer Science and Information Technology. 2011 Jul; 1(2):281–92.
  • Subramanian BKK, Sheeba M. Emerging intuitionistic fuzzy classifiers for intrusion detection system. Journal of Advances in Information Technology. 2011 May; 2(2):99–108.
  • Lu XY, Chu XQ, Chen MH, Chang PC, Chen SH. Artificial immune network with feature selection for bank term deposit recommendation. Journal of Intelligent Information Systems. 2016; 1.
  • Pakdaman M, Effati S. Fuzzy projection over a crisp set and applications. International Journal of Fuzzy Systems. 2016; 18(2):312.
  • Singh P. High-order fuzzy-neuro-entropy integration-based expert system for time series forecasting. Neural Computing and Applications. 2016; 1.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.