The Affect of Fuzzification on Neural Networks Intrusion Detection System

被引:0
|
作者
Ali, Khattab M. [1 ]
Venus, W. [2 ]
Al Rababaa, Mamoun Suleiman [1 ]
机构
[1] Al Al Bayt Univ, Coll IT, Dept CS, Mafraq, Jordan
[2] Al Al Bayt Univ, Coll IT, Dept CS Samawi, Mafraq, Jordan
关键词
Intrusion detection; Neural network; Fuzzy set;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection (ID) is an interesting approach that could be used to improve the security of network systems. IDS detects suspected patterns of network traffic on the remaining open parts through monitoring user activities (runtime gathering of data from system operations), and the subsequent analysis of these activities. The purpose of this work is to contribute ideas or finding a solution to detect attacks (Intrusion) through building artificial detection system using feedforward neural networks to detect attacks with low false negative rate (which is the most important point), and low false positive rate. To do so, two feedforward neural networks architectures (one for non fuzzified data, the other for fuzzified data) are suggested, and their behaviors in detecting the attacks are studied. In this research, the suggested IDS not only has the ability to distinguish if the access is normal or attack, but also capable of distinguishing the attack type.
引用
收藏
页码:1227 / +
页数:3
相关论文
共 50 条
  • [21] Graph Neural Networks for Intrusion Detection: A Survey
    Bilot, Tristan
    Madhoun, Nour El
    Al Agha, Khaldoun
    Zouaoui, Anis
    IEEE ACCESS, 2023, 11 : 49114 - 49139
  • [22] Applications of neural networks in network intrusion detection
    Lazarevic, Aleksandar
    Pokrajac, Dragoljub
    Nikolic, Jelena
    NEUREL 2006: EIGHT SEMINAR ON NEURAL NETWORK APPLICATIONS IN ELECTRICAL ENGINEERING, PROCEEDINGS, 2006, : 59 - +
  • [23] Neural networks applied in intrusion detection systems
    Bonifacio, JM
    Cansian, AM
    de Carvalho, ACPLF
    Moreira, ES
    IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1998, : 205 - 210
  • [24] Intrusion detection using hierarchical neural networks
    Zhang, CL
    Jiang, J
    Kamel, M
    PATTERN RECOGNITION LETTERS, 2005, 26 (06) : 779 - 791
  • [25] Investigating supervised neural networks to intrusion detection
    Ahmad, Iftikhar
    Abdullah, Azween
    Alghamdi, Abdullah
    ICIC Express Letters, 2010, 4 (6 A): : 2133 - 2138
  • [26] Intrusion Detection Using Evolutionary Neural Networks
    Michailidis, Emmanuel
    Katsikas, Sokratis K.
    Georgopoulos, Efstratios
    PCI 2008: 12TH PAN-HELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2008, : 8 - +
  • [27] Intrusion detection through artificial neural networks
    Mussoi de Lima, Igor Vinicius
    Degaspari, Joelson Alencar
    Mangueira Sobral, Joao Bosco
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 867 - 870
  • [28] Intrusion detection based on fuzzy neural networks
    An, Ji-yao
    Yue, Guangxue
    Yu, Fei
    Li, Ren-fa
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 231 - 239
  • [29] Optimization of Neural Networks for Network Intrusion Detection
    Wang, Huiran
    Ma, Ruifang
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 418 - +
  • [30] Scalable intrusion detection with recurrent neural networks
    Anyanwu, Longy O.
    Keengwe, Jared
    Arome, Gladys A.
    International Journal of Multimedia and Ubiquitous Engineering, 2011, 6 (01): : 21 - 28