Intrusion Detection System Using Fuzzy Inference System
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 8
Abstract
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access or denial of a computer network and network accessible resources. Intrusions are the activities that violate the security policy of a system. An Intrusion detection system monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Previously several machine learning algorithms such as neural network ,data mining and many more have been used to detect intrusion behaviour. In the proposed system we have designed fuzzy inference approach for effectively identifying the intrusion activities within a network. The proposed system uses Sugeno Fuzzy Inference system for generation of fuzzy rules and ANFIS editor for experimentation. The experimentation and evaluation of the proposed intrusion detection system are performed with KDDCup99Dataset and we can easily detect whether the records are normal or attack one
Authors and Affiliations
ANVBS Harikishan , P. Srinivasulu
Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks,presenting a challenger model for selective jamming attacks, which may give to...
An Integrated Approach to Measurement Software Defect using Software Matrices
Software measurement is a quantified attribute of a characteristic of a software product or the software process. It is a discipline within software engineering. Measurement programs in software organizations are a...
Towards Instructional Design of Ubiquitous Learning Environments
A remarkable shift of what technologies may offer particularly mobile, wireless and sensor-based ones, i. e. a SF like environment in which ubiquitous and pervasive technologies provide for opportunities only imagi...
Robust Data Clustering Algorithms for Network Intrusion Detection
IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data min...
Fractal Image Compression & Algorithmic Techniques
Fractal image compression is a very advantageous technique based on the representation of an image by a contractive transform. Based on fractals Fractal compression is a lossy compression method for digital images. The m...