D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A decade of Kasabov's evolving connectionist systems: a review
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Evolutionary flexible neural networks for intrusion detection system
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
SCIDS: a soft computing intrusion detection system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference
Engineering Applications of Artificial Intelligence
kENFIS: kNN-based evolving neuro-fuzzy inference system for computer worms detection
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Hi-index | 0.00 |
The Intrusion Detection System architecture commonlyused in commercial and research systems have a numberof problems that limit their configurability, scalability orefficiency. In this paper, two machine-learningparadigms, Artificial Neural Networks and FuzzyInference System, are used to design an IntrusionDetection System. SNORT is used to perform real timetraffic analysis and packet logging on IP network duringthe training phase of the system. Then a signature patterndatabase is constructed using protocol analysis andNeuro-Fuzzy learning method. Using 1998 DARPAIntrusion Detection Evaluation Data and TCP dump rawdata, the experiments are deployed and discussed.