SCIDS: A Soft Computing Intrusion Detection System
نویسندگان
چکیده
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This paper evaluates three fuzzy rule based classifiers for IDS and the performance is compared with decision trees, support vector machines and linear genetic programming. Further, Soft Computing (SC) based IDS (SCIDS) is modeled as an ensemble of different classifiers to build light weight and more accurate (heavy weight) IDS. Empirical results clearly show that SC approach could play a major role for intrusion detection.
منابع مشابه
D-SCIDS: Distributed soft computing intrusion detection system
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. A Distributed IDS (DIDS) consists of several IDS over a large network (s), all of which communicate with each other, or with a central server that facilitates advanced network monitoring. In a distributed environment, D...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملIntrusion Detection Using Ensemble of Soft Computing Paradigms
Soft computing techniques are increasingly being used for problem solving. This paper addresses using ensemble approach of different soft computing techniques for intrusion detection. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDSs) are essential for protecting information systems security, and yet it remains an elusive goal and a great challen...
متن کاملSoft Computing Based Intrusion Detection System
-Intrusion Detection System is used to detect the unwanted activities over the network and to design IDS soft computing techniques are used. This paper describes the role of Artificial Neural Network, Fuzzy Logic and Genetic Algorithm in Intrusion Detection System. The artificial neural network learning algorithms, data retrieval using fuzzy logic under uncertainty and power of Genetic algorith...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004