A Layered Approach for Intrusion Detection Using Fuzzy Artmap Neural Network Classifier

نویسندگان

  • J. Sravan Kumar
  • Ravi Prakash Reddy
  • Subha Sree
چکیده

Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine learning techniques have been proposed in recent years for the development of better intrusion detection systems. Many researchers used Conditional Random Fields and Layered Approach for purpose of intrusion detection. They also demonstrated that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered approach. In the paper we propose a new method called fuzzy ARTMAP classifier (FAM) and clustering technique for effectively identifying the intrusion activities within a network. Processing huge data would make the system error prone, hence clustering the data into groups and then processing will result in having a better system. From each of the cluster, representative data is selected in the selective process for further processing. For classification process, layered fuzzy ARTMAP will have the better results when compared to other normal classifier algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kappa-PSO-ARTMAP Fuzzy: uma metodologia para detecção de intrusos baseado em seleção de atributos e otimização de parâmetros numa rede neural ARTMAP Fuzzy

In the last years have seen a strong increase in the 802.11 wireless local area network (WLAN) technologies use, and the security mechanisms implemented by amendments IEEE 802.11i and IEEE 802.11w have proven not very effective in combating attacks against availability of WLAN services. Intrusion detection systems emerge as a way to help computer networks in this combat against the deny of serv...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

A Novel Classification Method Using Hybridization of Fuzzy Clustering and Neural Networks for Intrusion Detection

In this paper, a hybrid classifier using fuzzy clustering and several neural networks has been proposed. With using the fuzzy C-means algorithm, training samples will be clustered and the inappropriate data will be detected and moved to another dataset (RemovedDataset) and used differently in the classification phase. Also, in the proposed method using the membership degree of samples to the cl...

متن کامل

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Considerable research work have been conducted towards Intrusion Detection Systems (IDSs) as well as feature selection. IDS guard a system from attack, misuse, and compromise. It can also screen network activity. Network traffic observing and extent is increasingly regarded as an vital role for understanding and improving the performance and security of our cyber infrastructure. In this researc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014