Communications of the ACM
Centroid of a type-2 fuzzy set
Information Sciences: an International Journal
Immunocomputing: Principles and Applications
Immunocomputing: Principles and Applications
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Architecture for an Artificial Immune System
Evolutionary Computation
Computing with words and its relationships with fuzzistics
Information Sciences: an International Journal
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Intrusion detection using sequences of system calls
Journal of Computer Security
Advances in artificial immune systems
IEEE Computational Intelligence Magazine
IEEE Transactions on Fuzzy Systems
Uncertainty bounds and their use in the design of interval type-2 fuzzy logic systems
IEEE Transactions on Fuzzy Systems
Interval Type-2 Fuzzy Logic Systems Made Simple
IEEE Transactions on Fuzzy Systems
Hi-index | 0.00 |
In this paper, we suggest a flexible type-2 fuzzy set algorithm for analysing anomalous behavior trends of some system parameters. This algorithm can be implemented in a performance-based Artificial Immune System (AIS) and used as anomalous behavior recognition engine for a biological-inspired Intrusion Detection System (IDS). The suggested algorithm is based on the idea that real-world applications have the necessity of providing a strong, reliable discrimination between normal and abnormal behaviors but such discrimination is not always well-defined. This fact introduces many degrees of uncertainties in rule-based systems and convinced us to implement a type-2 fuzzy set algorithm that can easily manipulate and minimize the effect of uncertainties in our system.