Anomaly Detection Using Cooperative Fuzzy Logic Controller

作者: Ali Feizollah , Shahaboddin Shamshirband , Nor Badrul Anuar , Rosli Salleh , Miss Laiha Mat Kiah

DOI: 10.1007/978-3-642-40409-2_19

关键词:

摘要: This paper presents an Intrusion Detection System (IDS) with the integration of multi agent systems and artificial intelligence techniques such as fuzzy logic controller (FLC), multi-layer perceptron (MLP) adaptive neuro-fuzzy inference system (ANFIS). The introduces Network Systems (NIDS), which monitors network traffic detect any possible attacks. is made up three agents: accumulator, analyser decision maker agents. accumulator works to gather filter traffics. uses tree (DT) classify data. Finally, (FLC) make final decision. proposed was simulated using KDDCup 1999 dataset experimental results show improvement attack detection accuracy 99.95% false alarm rate 1%.

参考文章(23)
Nor Badrul Anuar, Hasimi Sallehudin, Abdullah Gani, Omar Zakaria, Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree Malaysian Journal of Computer Science. ,vol. 21, pp. 101- 115 ,(2008) , 10.22452/MJCS.VOL21NO2.3
Samira Kalantari, Zeinab Bakhsh, Shahaboddin Shamshirb, Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern Scientific Research and Essays. ,vol. 5, pp. 592- 605 ,(2010)
Chennakesava R Alavala, Fuzzy logic and neural networks : basic concepts & application New Age International. ,(2008)
Peter Mell, Vincent Hu, Richard Lippmann, Josh Haines, Marc Zissman, An Overview of Issues in Testing Intrusion Detection Systems NIST Interagency/Internal Report (NISTIR) - 7007. ,(2003) , 10.6028/NIST.IR.7007
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Steven J. Scheer, Stuart M. Weinstein, 1. An overview Archives of Physical Medicine and Rehabilitation. ,vol. 73, ,(1992) , 10.5555/URI:PII:000399939290246S
Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan Clarke, Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) Security and Communication Networks. ,vol. 6, pp. 1087- 1116 ,(2013) , 10.1002/SEC.673
Wang Xiaohu, Wang Lele, Li Nianfeng, An Application of Decision Tree Based on ID3 Physics Procedia. ,vol. 25, pp. 1017- 1021 ,(2012) , 10.1016/J.PHPRO.2012.03.193