Towards fuzzy anomaly detection-based security: a comprehensive review

被引:15
|
作者
Masdari, Mohammad [1 ]
Khezri, Hemn [2 ]
机构
[1] Islamic Azad Univ, Comp Engn Dept, Urmia Branch, Orumiyeh, Iran
[2] Afagh Higher Educ Inst, Comp Engn Dept, Orumiyeh, Iran
关键词
Anomaly detection; ANFIS; Fuzzy logic; FCM; Feature selection; Neuro-fuzzy; INTRUSION-DETECTION; DETECTION SYSTEM; GENETIC ALGORITHM; C-MEANS; NETWORK; MANAGEMENT; ATTACKS;
D O I
10.1007/s10700-020-09332-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the data security context, anomaly detection is a branch of intrusion detection that can detect emerging intrusions and security attacks. A number of anomaly detection systems (ADSs) have been proposed in the literature that using various algorithms and techniques try to detect the intrusions and anomalies. This paper focuses on the ADS schemes which have applied fuzzy logic in combination with other machine learning and data mining techniques to deal with the inherent uncertainty in the intrusion detection process. For this purpose, it first presents the key knowledge about intrusion detection systems and then classifies the fuzzy ADS approaches regarding their utilized fuzzy algorithm. Afterward, it summarizes their major contributions and illuminates their advantages and limitations. Finally, concluding issues and directions for future researches in the fuzzy ADS context are highlighted.
引用
收藏
页码:1 / 49
页数:49
相关论文
共 50 条
  • [41] A fuzzy anomaly detection system
    Li, Dan
    Wang, Kefei
    Deogun, Jitender S.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 167 - 168
  • [42] GAN-based anomaly detection: A review
    Xia, Xuan
    Pan, Xizhou
    Li, Nan
    He, Xing
    Ma, Lin
    NEUROCOMPUTING, 2022, 493 : 497 - 535
  • [43] The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection
    Zhao, Chunxia
    Linjing, Wang
    Fan, Liao
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 587 - 591
  • [44] A detection-based person tracking algorithm
    Hu, D. (dwhu@nudt.edu.cn), 1600, National University of Defense Technology (36):
  • [45] Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
    Peng, Jinghui
    Jiang, YiJing
    Tang, Shanyu
    Meziane, Farid
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1962 - 1973
  • [46] Intelligent jamming detection-based robust principal components analysis in communication system for security and defense
    Moumena, Ahmed
    Haddache, Imane Saim
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [47] Anomaly detection based on weighted fuzzy-rough density
    Yuan, Zhong
    Chen, Baiyang
    Liu, Jia
    Chen, Hongmei
    Peng, Dezhong
    Li, Peilin
    APPLIED SOFT COMPUTING, 2023, 134
  • [48] Real Time Anomaly detection-Based QoE Feature selection and Ensemble Learning for HTTP Video Services
    Abar, Tasnim
    Ben Letaifa, Asma
    El Asmi, Sadok
    2019 7TH INTERNATIONAL CONFERENCE ON ICT & ACCESSIBILITY (ICTA), 2019,
  • [49] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [50] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86