Fuzzy model tuning for Intrusion Detection Systems

被引:0
|
作者
Yu, Zhenwei [1 ]
Tsai, Jeffrey J. P. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection System (IDS) detects ongoing intrusive activities in information systems. However, an IDS usually suffers high false alarm especially in a dynamically changing environment, which forces continuous tuning on its detection model to maintain sufficient performance. Currently, the manually tuning work greatly depends on the user to work out and integrate the tuning solution. We have developed an automatically tuning intrusion detection system (ATIDS). The experimental results show that when tuning is not delayed too long, the system can achieve about 20% improvement compared with the system without model tuner. But the user can only control whether the tuning should be performed by sending/blocking feedbacks. To give the user more powerful but intuitive control on the tuning, we develop a fuzzy model tuner, through which the user can tune the model fuzzily but yield much appropriate tuning. The results show the system can achieve about 23% improvement.
引用
收藏
页码:193 / 204
页数:12
相关论文
共 50 条
  • [31] A testbed for quantitative assessment of intrusion detection systems using fuzzy logic
    Singaraju, G
    Teo, L
    Zheng, YL
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 79 - 93
  • [32] Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
    Abadeh, Mohammad Saniee
    Mohamadi, Hamid
    Habibi, Jafar
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) : 7067 - 7075
  • [33] Genetic-Fuzzy Association Rules for Network Intrusion Detection Systems
    Su, Ming-Yang
    Lin, Chun-Yuen
    Chien, Sheng-Wei
    Hsu, Han-Chung
    IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), 2011, : 2046 - 2052
  • [34] Performance Comparison of Neuro-Fuzzy Cloud Intrusion Detection Systems
    Raja, Sivakami
    Ramaiah, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (1A) : 142 - 149
  • [35] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    APPLIED SOFT COMPUTING, 2020, 92 (92)
  • [36] Black Hole attack Detection using Fuzzy based Intrusion Detection Systems in MANET
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1176 - 1181
  • [37] Hierarchical Model for Intrusion Detection Systems in the Cloud Environment
    Abdulazeez, Muhammed
    Kowalski, Dariusz
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 319 - 327
  • [38] Model selection for kernel based intrusion detection systems
    Mukkamala, S
    Sung, AH
    Ribeiro, BM
    ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, 2005, : 458 - 461
  • [39] Data mining descriptive model for intrusion detection systems
    Hentea, M
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 1118 - 1119
  • [40] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177