作者: Jugal K. Kalita , Lori L. Delooze
DOI:
关键词:
摘要: As more computers are integrated into the Internet, threat of computer crimes increases and it becomes much difficult challenging to predict prevent attacks malicious intrusions. We apply soft computing techniques artificial neural networks, evolutionary fuzzy logic produce an effective Intrusion Detection System (IDS) classify by type characterize connection according its behavior. created ensemble Self-Organizing Maps (SOM), one for each four major attack families: Denial Service, Probe, Remote Local User Root. A genetic algorithm determined best possible feature set input vectors SOMs. After labeling neurons in SOM, we formed a "buffer zone" around them. The SOMs detected as well or better than any system original Knowledge Data Discovery 1999 Competition. The that surrounds nodes can be used two purposes. First, neighbourhood associated connections either "attack-like" normal "normal-like" connections. Each will have value from 0 1 SOM collection. This additional information is very valuable analyst when considering wide range responsive actions. Second, removing amplify contrast between other weights remaining after removed create reduced rule describes classification type. found rules which they were derived, with significantly lower false alarm rate.