Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.5.595

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks  

Cha, Byung-Rae (여수대학교 전산학과)
Abstract
By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.
Keywords
Anomaly Intrusion Detection; Fuzzy Membership Function; Neural Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 James A. Freeman and David M. Skapura, 'Neural Networks : Algorithms, Applications and Programming Techniques,' pp.89-123, Addison Wesley, 1992
2 Martin T. Hagan, Howard B. Demuth, MA가 Beale, 'Neural Network Design,' PWS publishing Company, 1996
3 Susan M. Bridges, Rayford B. Vaughn, 'INTRUSION DETECTION VIA FUZZY DATA MINING,' Accepted for Presentation at The Twelfth Annual Canadian Information Technology Security Symposium pp.19-23, June, 2000
4 Jack Marin, Daniel Ragsdale and John Surdu, 'A Hybrid Approach to the profile Creation and Instrusion Detection,' Information Technology and Operations Center, United States Military Academy
5 Jonatan Gomez and Dipankar Dasgupta, 'Evolving Fuzzy Classifiers for Intrusion Detection,' Proceedings of the 2002 IEEE Workshop on Information Assurance, 2002
6 Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, 'HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification,' proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001
7 Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, 'Intrusion Detection : Support Vector Machines and Neural Networks,' New Mexico Institute of Mining and Technology
8 Hofmann, A., Schmitz, C, and Sick, B., 'Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers,' Springer LNCS, pp.316-324, 2003
9 LiMin Fu, 'Neural Networks in Computer Intelligence,' McGraw-Hill, Inc., 1994
10 http://www.ll.mit.edu/IST/ideval/data_index.html
11 Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff, 'A Sense of Self for Unix Processes,' In Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp.120-128, 1996   DOI
12 박봉구, 한상언, 차병래, '컴퓨터를 활용한 이산수학', 교우사, pp.231-242, 2003
13 Dorothy E. Denning, 'An Intrusion-Detection Model,' IEEE Transaction on Software Engineering, Vol.SE-13, No.2, pp.222-232, February, 1987   DOI   ScienceOn
14 Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matthew Miller, Shlomo Hershkop and Junxin Zhang, 'Real Time Data Mining - based Intrusion Detection,' IEEE, 2001   DOI
15 Nong Ye and Xiangyang Li, 'A Scalable Clustering Technique for Intrusion Signature Recognition,' Proceedings of 2001 IEEE Workshop on Information Assurance and Security, 2001
16 Matthew V. Mahoney and Philip K. Chan, 'Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks,' 2002   DOI
17 Leonid Portnoy, 'Intrusion detection with unlabeled data using clustering,' Undergraduate Thesis, Columbia University, 2000
18 D. Barbara, N. Wu and S. Jajodia, 'Detecting novel network intrusions using bayes estimators,' In Proc. SIAM Intl. Conf. Data Mining, 2001
19 Jack Marin, Daniel Ragsdale and John Shurdu, 'A Hybrid Approach to the Profile Creation and Intrusion Detection,' Proceedings of DARPA Information Survivability Conference and Exposition, IEEE, 2001   DOI
20 Silicon Defence. Spade. In http://www.silicondefense.com/software/spice/, 2001
21 D. Anderson, T. Lunt, H. Javitz, A. Tamaru and A. Valdes, 'Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system(nides),' In Technical Report SRI-CSL-95-06, SRI, 1995