Intrusion Detection System using Fuzzy Logic and Data Mining Technique

作者: Prajkta P. Chapke , Rupali R. Deshmukh

DOI: 10.1145/2743065.2743128

关键词:

摘要: … It is also known as anomaly detection or detection by behavior… A signature based IDS will monitor packets on the network … a database of signatures or attributes from known malicious …

参考文章(20)
R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, M. A. Zissman, Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation Defense Technical Information Center. ,(1999) , 10.21236/ADA526274
Rossouw von Solms, Martin Botha, Edwin Loubser, George Yamoyany, Kent Perry, The utilization of artificial intelligence in a hybrid intrusion detection system south african institute of computer scientists and information technologists. pp. 149- 155 ,(2002) , 10.5555/581506.581527
Peyman Kabiri, Ali A. Ghorbani, RESEARCH ON INTRUSION DETECTION AND RESPONSE: A SURVEY International Journal of Network Security. ,vol. 1, pp. 84- 102 ,(2005) , 10.6633/IJNS.200509.1(2).05
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé, A serial combination of anomaly and misuse IDSes applied to HTTP traffic annual computer security applications conference. pp. 428- 437 ,(2004) , 10.1109/CSAC.2004.4
Robert Orchard, Fuzzy Reasoning in JESS: The Fuzzyj Toolkit and Fuzzyjess. international conference on enterprise information systems. pp. 533- 542 ,(2001)
J.E. Dickerson, J.A. Dickerson, Fuzzy network profiling for intrusion detection north american fuzzy information processing society. pp. 301- 306 ,(2000) , 10.1109/NAFIPS.2000.877441
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
Ma Yanchun, The intrusion detection system based on fuzzy association rules mining international conference on computer engineering and technology. ,vol. 7, ,(2010) , 10.1109/ICCET.2010.5485674
Chan Man Kuok, Ada Fu, Man Hon Wong, Mining fuzzy association rules in databases international conference on management of data. ,vol. 27, pp. 41- 46 ,(1998) , 10.1145/273244.273257