Please use this identifier to cite or link to this item:
http://103.99.128.19:8080/xmlui/handle/123456789/249
Title: | Network Intrusion Detection System Using Fuzzy Logic |
Other Titles: | International Conference on Electronics, Computer and Communication (ICECC 2008) ICECC 2008 |
Authors: | Hoque, Mohammed Moshiul Karim, Meher-Ul- Mohit, Kazi Abdul Ullah, Muhammad Ahsan |
Keywords: | Fuzzy logic Fuzzy Rule and Defuzzyfication Fuzzy matching Fuzzy inference detection Intrusion |
Issue Date: | 27-Jun-2008 |
Publisher: | Bangladesh Electronics Society: Rajshahi, Bangladesh |
Abstract: | Computer and network security plays an important role in modern communication. An efficient network is free from malicious activities. Today’s network administrators have to pay most of their efforts to make the network secured. This paper presents a network intrusion detection system using fuzzy logic approach. Throughout this paper, we have developed an intrusion detection system that uses fuzzy rules to differentiate normal and abnormal activities. For building fuzzy rules, we use membership function depending on normal activities in network environment. A rule is matched with some degree of membership value. All data are combined and defuzzyfied. We have tested detection system with several datasets with 92% accuracy. |
Description: | Bangladesh Electronics Society (BES): Rajshahi is going to organize an international conference to unveil the recent developments of Electronics, Materials, Computer and Communication and bring together the scientists, researchers and engineers from academia and industries of the world to interact among themselves for exchange of knowledge, ideas and views for enhancing mutual co-operation. |
URI: | http://103.99.128.19:8080/xmlui/handle/123456789/249 |
ISBN: | 984-300-002131-3 |
Appears in Collections: | proceedings in CSE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Network Intrusion Detection System Using Fuzzy Logic.pdf | 408.22 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.