A Fuzzy Neural Network and Multiple Kernel Fuzzy C-means Algorithm for Secured Intrusion Detection System

نویسندگان

  • P. ANANTHI
  • P. BALASUBRAMANIE
چکیده

An Intrusion Detection System (IDS) is a security layer used to detect constant intrusive behavior in information systems. Many intrusion detection systems have been proposed based on the various data mining approaches such as decision tree, clustering, etc. Although the intrusion detection system is efficient way to find the attacks in the system, existing ones have some disadvantages which affects the performance of the system. It is observed that Neural Networks improves the overall performance of the intrusion detection system when it is integrated with a clustering approach. This research work aims to improve the performance of the intrusion detection system through the application of Fuzzy Neural Network along with an efficient fuzzy clustering method. In this proposed approach, initially Multiple Kernel Fuzzy C-Means (MKFCM) technique is used to construct different training subsets. The performance of the fuzzy clustering approach is improved through MKFCM. Then, different FNN models are trained to formulate different base models according to the different training models. Then the final results are aggregated through fuzzy based approach. The performance of the proposed MKFCM-FNN approach is compared with other existing approaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Intrusion Detection System Using Kernel FCM Clustering and Bayesian Neural Network

Data safekeeping and security has been a key concern in the rapidly growing computer systems and networks. One of the recent methods for identifying any abnormal activities staging in a computer system is carried out by Intrusion Detection Systems (IDS) and it forms a significant portion of system defence against attacks. Various methods based on Intrusion Detection Systems have been proposed i...

متن کامل

Application of Pattern Recognition Algorithms for Clustering Power System to Voltage Control Areas and Comparison of Their Results

Finding the collapse susceptible portion of a power system is one of the purposes of voltage stability analysis. This part which is a voltage control area is called the voltage weak area. Determining the weak area and adjecent voltage control areas has special importance in the improvement of voltage stability. Designing an on-line corrective control requires the voltage weak area to be determi...

متن کامل

Application of Pattern Recognition Algorithms for Clustering Power System to Voltage Control Areas and Comparison of Their Results

Finding the collapse susceptible portion of a power system is one of the purposes of voltage stability analysis. This part which is a voltage control area is called the voltage weak area. Determining the weak area and adjecent voltage control areas has special importance in the improvement of voltage stability. Designing an on-line corrective control requires the voltage weak area to be determi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014