NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 1
Abstract
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. In the proposed system, we have designed fuzzy logic-based system for effectively identifying the intrusion activities within a network. The proposed fuzzy logic-based system can be able to detect an intrusion behavior of the networks since the rule base contains a better set of rules. Here, we have used automated strategy for generation of fuzzy rules, which are obtained from the definite rules using frequent items. The experiments and evaluations of the proposed intrusion detection system are performed with the KDD Cup 99 intrusion detection dataset. The experimental results clearly show that the proposed system achieved higher precision in identifying whether the records are normal or attack one.
Authors and Affiliations
R. Shanmugavadivu , Dr. N. Nagarajan
A SURVEY OF SKYLINE PROCESSING IN VARIOUS ENVIRONMENT
Skyline queries which received an interesting attention to the database and data mining field and its main advantage is it is used for multi-criteria decision making. Advanced query operators, such as skyline queries are...
ANFIS IN THE CHARACTERIZATION OF FIBROSIS AND CARCINOMA USING LUNG CT IMAGES
The diagnosis of tuberculosis and lung cancer is difficult, as symptoms of both diseases are similar. Due to high TB prevalence and radiological similarities, a large number of lung cancer patients initially get wrongly...
A TRAILBLAZING MODUS OPERANDI TO FACE IDENTIFICATION USING A RECKONING ARCHETYPAL PRINCIPAL COMPONENT ANALYSIS
Face identification is a task of designating human faces with exact names, akin to identifying between similar twins. The work was motivated and is imbibed by physiology and information theory domains. The approach treat...
LEAKAGE POWER OPTIMIZED SEQUENTIAL CIRCUITS FOR USE IN NANOSCALE VLSI SYSTEMS
As the density and operating speed of CMOS VLSI chips increases, leakage power dissipation becomes more and more significant. Therefore it is necessary to reduce the leakage power of portable battery operated devices. Th...
ONLINE SCAMS: TAKING THE FUN OUT OF THE INTERNET
The fun of using the Internet has become sour due to the various scams taking place day in and day out, all around the world. Internet users are being trapped around every corner and their credit card information is bein...