Detection of Anomalies in Large-Scale Cyberattacks Using Fuzzy Neural Networks

作者: Paulo Vitor de Campos Souza , Augusto Junio Guimarães , Thiago Silva Rezende , Vinicius Jonathan Silva Araujo , Vanessa Souza Araujo

DOI: 10.3390/AI1010005

关键词: Artificial neural networkData miningAnomaly detectionThe InternetIntelligent decision support systemContext (language use)Identification (information)Expert systemFuzzy logicComputer science

摘要: The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern classification, including detection failures and anomalous behaviors. This paper discusses use an artificial intelligence model based on association between logic training to recognize anomalies transactions involved context computer cyberattacks. In addition verifying accuracy model, rules were obtained through knowledge from massive datasets form expert systems. acquired allow creation intelligent systems high-level languages with a robust level identification Internet transactions, results test confirms anomaly high-security attacks networks.

参考文章(114)
Yihua Liao, V. Rao Vemuri, Wenjie Hu, Robust Support Vector Machines for Anomaly Detection in Computer Security. international conference on machine learning and applications. pp. 168- 174 ,(2003)
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection information assurance and security. ,(2000)
Sushmita Mitra, Sankar K. Pal, Neuro-Fuzzy Pattern Recognition: Methods in Soft Computing John Wiley & Sons, Inc.. ,(1999)
Swee Chuan Tan, Kai Ming Ting, Tony Fei Liu, Fast anomaly detection for streaming data international joint conference on artificial intelligence. pp. 1511- 1516 ,(2011) , 10.5591/978-1-57735-516-8/IJCAI11-254
Witold Pedrycz, Fernando Gomide, Fuzzy Systems Engineering: Toward Human-Centric Computing ,(2007)
Eleazar Eskin, Anomaly Detection over Noisy Data using Learned Probability Distributions international conference on machine learning. pp. 255- 262 ,(2000) , 10.7916/D8C53SKF
David D. Lewis, Naive (Bayes) at forty: The independence assumption in information retrieval Machine Learning: ECML-98. pp. 4- 15 ,(1998) , 10.1007/BFB0026666
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
H.D. Cheng, Muyi Cui, Mass lesion detection with a fuzzy neural network Pattern Recognition. ,vol. 37, pp. 1189- 1200 ,(2004) , 10.1016/J.PATCOG.2003.11.002
D.W.J. Stein, S.G. Beaven, L.E. Hoff, E.M. Winter, A.P. Schaum, A.D. Stocker, Anomaly detection from hyperspectral imagery IEEE Signal Processing Magazine. ,vol. 19, pp. 58- 69 ,(2002) , 10.1109/79.974730