Adaptive Web Intrusion Detection Based on Immune and Fuzzy Logic

作者: Lai Xing-rui

DOI:

关键词: Adaptive neuro fuzzy inference systemWeb applicationAnomaly-based intrusion detection systemWeb serverComputer scienceFuzzy ruleArtificial intelligenceFuzzy logicData miningIntrusion detection systemMachine learningNeuro-fuzzy

摘要: Web servers and web applications have become one of the most important communication channels on Internet. Web-based vulnerabilities represent a substantial portion security exposures computer networks. It appears more difficult to detect intrusion. This paper describes an adaptive intrusion detection model based immune fuzzy logic. The creates respectively rule collection natural behaviour mode inspecting with improved generation candidate itemsets. is detected by difference between two collections. Besides, updates rules automatically constantly improve ability detecting new intrusions. Experiment results indicate that has better efficiency in identifying abnormal compared no update non-fuzzy model.

参考文章(15)
Markus P. Turkia, Kyle A. Gallivan, Peiyi Tang, Mining web access patterns with first-occurrence linked WAP-trees. software engineering and data engineering. pp. 247- 252 ,(2007)
Qiankun Zhao, Sourav S. Bhowmick, Mining history of changes to web access patterns european conference on principles of data mining and knowledge discovery. pp. 521- 523 ,(2004) , 10.1007/978-3-540-30116-5_53
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, Adaptive Intrusion Detection: A Data Mining Approach Artificial Intelligence Review. ,vol. 14, pp. 533- 567 ,(2000) , 10.1023/A:1006624031083
Terran Lane, Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection computer and communications security. pp. 150- 158 ,(1998) , 10.1145/288090.288122
Gary Wassermann, Zhendong Su, Sound and precise analysis of web applications for injection vulnerabilities Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation - PLDI '07. ,vol. 42, pp. 32- 41 ,(2007) , 10.1145/1250734.1250739
Peili Qiao, Jie Su, Yahui Liu, Distributed intrusion detection system based on fuzzy rules Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006. ,vol. 6241, ,(2006) , 10.1117/12.665177
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, Mining in a data-flow environment: experience in network intrusion detection knowledge discovery and data mining. pp. 114- 124 ,(1999) , 10.1145/312129.312212
Qiao Yan, Jianping Yu, None, AINIDS: an immune-based network intrusion detection system Data mining, intrusion detection, information asurance, and data networks security. Conference. ,vol. 6241, ,(2006) , 10.1117/12.664752
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914