NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 1
Abstract
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. In the proposed system, we have designed fuzzy logic-based system for effectively identifying the intrusion activities within a network. The proposed fuzzy logic-based system can be able to detect an intrusion behavior of the networks since the rule base contains a better set of rules. Here, we have used automated strategy for generation of fuzzy rules, which are obtained from the definite rules using frequent items. The experiments and evaluations of the proposed intrusion detection system are performed with the KDD Cup 99 intrusion detection dataset. The experimental results clearly show that the proposed system achieved higher precision in identifying whether the records are normal or attack one.
Authors and Affiliations
R. Shanmugavadivu , Dr. N. Nagarajan
COMPARISON OF NORMAL SELFISH OVERLAY NETWORK AND SELFISH OVERLAY NETWORK WITH DEPLOYMENT OF OVERLAY NODES USING FUZZY LOGIC
Selfish overlay routing is the technique whereby the sender of the packet can specify the route that the packet should take through the network. Selfish overlay routing allow end users to select routes in an egocentic fa...
Predictive congestion control mechanism for MANET
In adhoc networks connection failure between source and destination often occurs, due to mobility of nodes. After every failure the connection between source and destination gets disconnected.The problem is while sending...
QOS PARAMETER ANALYSIS ON AODV AND DSDV PROTOCOLS IN A WIRELESS NETWORK
Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To imp...
ENERGY AWARE ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK
Technological advancements made major research challenges in the area of wireless sensor network. Power saving is the foremost criteria in this field. Consumption of energy is considerably reduced on properly designed pr...
Elimination of Estimation biases in the Software Development
The software effort estimations are usually too low and the prediction is also a very difficult task as software is intangible in nature. Also the estimation is based on the parameters that are usually partial in nature....