Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network traffic patterns as either 'normal' or 'abnormal'. Precisely, the main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by detecting malicious network activities such as port scans, denial of service or other attempts to crack computer network environments. Even though the incorporation of conventional Soft Computing techniques in NIDSs has yielded to good solutions, the strong dynamism characterizing network intrusion patterns tend to invalidate the usability of existing framework. To tackle this issue, our proposal performs an adaptive supervised learning on a collection of time series that characterizes the network behavior to create a so-called timed automata-based fuzzy controller (TAFC), i. e. an evolvable fuzzy controller whose dynamic features allow to design an advanced network intrusion detection system able to directly deal with computer network dynamism and support networks' administrators to prevent eventual damages coming from unauthorized network intrusion. As will be shown in experiments, where our approach has been compared with a conventional Mamdani fuzzy controller, the proposed system reduces the detection error and, as consequence, improves the computer network robustness. © 2011 Springer-Verlag.

Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems / Acampora, Giovanni. - In: SOFT COMPUTING. - ISSN 1432-7643. - 16:7(2012), pp. 1183-1196. [10.1007/s00500-011-0791-3]

Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems

Acampora Giovanni
2012

Abstract

Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network traffic patterns as either 'normal' or 'abnormal'. Precisely, the main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by detecting malicious network activities such as port scans, denial of service or other attempts to crack computer network environments. Even though the incorporation of conventional Soft Computing techniques in NIDSs has yielded to good solutions, the strong dynamism characterizing network intrusion patterns tend to invalidate the usability of existing framework. To tackle this issue, our proposal performs an adaptive supervised learning on a collection of time series that characterizes the network behavior to create a so-called timed automata-based fuzzy controller (TAFC), i. e. an evolvable fuzzy controller whose dynamic features allow to design an advanced network intrusion detection system able to directly deal with computer network dynamism and support networks' administrators to prevent eventual damages coming from unauthorized network intrusion. As will be shown in experiments, where our approach has been compared with a conventional Mamdani fuzzy controller, the proposed system reduces the detection error and, as consequence, improves the computer network robustness. © 2011 Springer-Verlag.
2012
Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems / Acampora, Giovanni. - In: SOFT COMPUTING. - ISSN 1432-7643. - 16:7(2012), pp. 1183-1196. [10.1007/s00500-011-0791-3]
File in questo prodotto:
File Dimensione Formato  
Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems.pdf

non disponibili

Tipologia: Documento in Post-print
Licenza: Accesso privato/ristretto
Dimensione 749.83 kB
Formato Adobe PDF
749.83 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/694278
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact