A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

被引:97
|
作者
Masdari, Mohammad [1 ]
Khezri, Hemn [2 ]
机构
[1] Islamic Azad Univ, Urmia Branch, Comp Engn Dept, Orumiyeh, Iran
[2] Afagh Higher Educ Inst, Comp Engn Dept, Orumiyeh, Iran
关键词
Intrusion detection; Fuzzy logic; ANFIS; FCM; Feature selection; Neuro-fuzzy; GENETIC ALGORITHM; C-MEANS; NETWORK; OPTIMIZATION; MODEL; SET;
D O I
10.1016/j.asoc.2020.106301
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations that benefit from information technologies are vulnerable to various attacks and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of defense which in conjunction with firewalls and other security components are applied to deal with intrusions and unauthorized misbehaviors. Misuse detection is one of the main branches of the intrusion detection which intends to prevent known security attacks regarding their previously known signatures. This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques to deal with different kinds of intrusions. For this purpose, it first presents the key points and knowledge about intrusion detection and then classifies the fuzzy misuse detection approaches regarding their applied fuzzy techniques and algorithms. Then, it illustrates the major contributions of the fuzzy IDS schemes and illuminates their merits and limitations. Besides, in each section, the comparison of their applied datasets, performance evaluation factors, feature extraction methods as well as the type of fuzzy logic controller (FLC) and membership functions are provided. Finally, the concluding issues and the directions for future researches are highlighted. (C) 2020 Published by Elsevier B.V.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [2] Attack Resilient Trust and Signature-based Intrusion Detection Systems
    Kabaso, Boniface
    Aradeh, Saber A.
    Abidoye, Ademola P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 701 - 707
  • [3] On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
    Diaz-Verdejo, Jesus
    Munoz-Calle, Javier
    Estepa Alonso, Antonio
    Estepa Alonso, Rafael
    Madinabeitia, German
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [4] A hybrid alarm management strategy in signature-based intrusion detection systems
    Munoz Cortes, Francisco
    Gaviria Gomez, Natalia
    2019 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM 2019), 2019,
  • [5] Variables influencing the effectiveness of signature-based network intrusion detection systems
    Sommestad, Teodor
    Holm, Hannes
    Steinvall, Daniel
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 711 - 728
  • [6] Analysis of update delays in signature-based network intrusion detection systems
    Gascon, Hugo
    Orfila, Agustin
    Blasco, Jorge
    COMPUTERS & SECURITY, 2011, 30 (08) : 613 - 624
  • [7] Characterizing Realistic Signature-based Intrusion Detection Benchmarks
    Aldwairi, Monther
    Alshboul, Mohammad A.
    Seyam, Asmaa
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 97 - 103
  • [8] A Fuzzy Signature-Based Approach for Recommendation Systems
    Aliberti, Luca
    D'Aniello, Giuseppe
    Gaeta, Matteo
    Marzolo, Alice
    2024 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ-IEEE 2024, 2024,
  • [9] CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection
    Tug, Steven
    Meng, Weizhi
    Wang, Yu
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1228 - 1235
  • [10] Using decision trees to improve signature-based intrusion detection
    Kruegel, C
    Toth, T
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191