Fuzzy Logic based Network Intrusion Detection Systems
Title | Fuzzy Logic based Network Intrusion Detection Systems |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Johanyák, Z. C. |
Conference Name | 2020 IEEE 18th World Symposium on Applied Machine Intelligence and Informatics (SAMI) |
Date Published | Jan. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3149-8 |
Keywords | abnormal network traffic, computer network, computer network security, computer networks, Cyber physical system, electronic communication, false positive classification, feature extraction, Fuzzy logic, fuzzy logic based solutions, fuzzy rule interpolation, interpolation, intrusion detection system, malicious activities, Metrics, network connectivity, network intrusion detection systems, NIDSs, noisy data, normal network traffic, pubcrawl, resilience, Resiliency, rule base generation steps, security |
Abstract | Plenary Talk Our everyday life is more and more dependent on electronic communication and network connectivity. However, the threats of attacks and different types of misuse increase exponentially with the expansion of computer networks. In order to alleviate the problem and to identify malicious activities as early as possible Network Intrusion Detection Systems (NIDSs) have been developed and intensively investigated. Several approaches have been proposed and applied so far for these systems. It is a common challenge in this field that often there are no crisp boundaries between normal and abnormal network traffic, there are noisy or inaccurate data and therefore the investigated traffic could represent both attack and normal communication. Fuzzy logic based solutions could be advantageous owing to their capability to define membership levels in different classes and to do different operations with results ensuring reduced false positive and false negative classification compared to other approaches. In this presentation, after a short introduction of NIDSs a survey will be done on typical fuzzy logic based solutions followed by a detailed description of a fuzzy rule interpolation based IDS. The whole development process, i.e. data preprocessing, feature extraction, rule base generation steps are covered as well. |
URL | https://ieeexplore.ieee.org/document/9108750 |
DOI | 10.1109/SAMI48414.2020.9108750 |
Citation Key | johanyak_fuzzy_2020 |
- intrusion detection system
- security
- rule base generation steps
- Resiliency
- resilience
- pubcrawl
- normal network traffic
- noisy data
- NIDSs
- network intrusion detection systems
- network connectivity
- Metrics
- malicious activities
- abnormal network traffic
- interpolation
- fuzzy rule interpolation
- fuzzy logic based solutions
- Fuzzy logic
- feature extraction
- false positive classification
- electronic communication
- Cyber Physical System
- computer networks
- computer network security
- computer network