NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 1
Abstract
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. In the proposed system, we have designed fuzzy logic-based system for effectively identifying the intrusion activities within a network. The proposed fuzzy logic-based system can be able to detect an intrusion behavior of the networks since the rule base contains a better set of rules. Here, we have used automated strategy for generation of fuzzy rules, which are obtained from the definite rules using frequent items. The experiments and evaluations of the proposed intrusion detection system are performed with the KDD Cup 99 intrusion detection dataset. The experimental results clearly show that the proposed system achieved higher precision in identifying whether the records are normal or attack one.
Authors and Affiliations
R. Shanmugavadivu , Dr. N. Nagarajan
Non-Equilibrium Flow Type Behaviour In Presence Of Transonic Free Streams Probably Caused By Turbulence Modeling Limitations For Base Flow Computations Using N-S Code, As Well As BASE2D Codes.
The computational difficulties in getting the flow field using a RANS solver of base flows is given here in two special cases where results were obtainable only when free stream flow was not considered. The computational...
Analyzing Throughput of TCP in IEEE 802.11 Based Ad-hoc Networks
In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it m...
REGRESSION TESTING : TABU SEARCH TECHNIQUE FOR CODE COVERAGE
Software testing is one of the most expensive and critical activities which carries out every time in order to give a best quality of a software product. Here the regression testing which is based on testing mechanism is...
ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS
This paper presents an overview of the optical burst switching (OBS) and discusses the major components. In OBS, the length of the burst arriving at a particular node is unknown, and hence, node design is very complex. I...
CERTAIN APPROACHES FOR A COMPLETE MATHEMATICAL TEXTTO-SPEECH SYSTEM
This paper discusses the teaching - learning process of mathematical subjects made accessible to visually disabled students. It aims to provide users a friendly vocal interface with computer and allow visually impaired p...