Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
نویسندگان
چکیده
منابع مشابه
Intrusion detection system based on fuzzy default logic
Current IDSs usually have several shortcomings. First, the speed and sensitivity of detection are not so ideal. Secondly, the response system lacks the ability to correct errors. Thirdly, the cost of intrusion detection is not considered, that is, the response policy is static. This paper applies fuzzy default theory to transform reasoning and response engine of IDS, based on the proving of IDS...
متن کاملNetwork Intrusion Detection System Based on Optimized Fuzzy Rules Algorithm
As computer networks and distributed applications more complex, diverse and intelligent, network behavior anomaly detection has gradually become the effective monitoring and system controlling technology. The paper established a network intrusion detection system and to investigate the data rules, sensors and abnormal behavior automatic identification in this system, a kind of algorithm based o...
متن کاملIntrusion Detection System on KDDCup99 Dataset: A Survey
Intrusion Detection provides a technique of identifying unwanted packets so the attacks or harm made from these intrusions can be minimize. Since various techniques are implemented for the discovery and categorization of intrusions. Some of the IDS is implemented on the network based and some are implemented for Host based. Here in this paper a survey of all the techniques implemented for the d...
متن کاملEntropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملNetwork Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System
The proliferation of computer networks has brought network security to the forefront. It has become imperative to devise new methods for network intrusion detection. Current methods are frequently unable to detect polymorphic or novel attack modes. In addition, the enormous volume of network traffic makes it difficult to monitor and evaluate all features of communication packets on the network....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2017
ISSN: 1084-8045
DOI: 10.1016/j.jnca.2017.03.018