Skip to main content

Network Anomalous Intrusion Detection using Fuzzy-Bayes

  • Conference paper

Part of the IFIP International Federation for Information Processing book series (IFIPAICT,volume 228)


Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing. Intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.

Key words

  • intrusion detection
  • fuzzy
  • naïve-Bayes


  1. Alan Bivens, Chandrika Palagiri, Raheda smith, Boleslaw Szymanski, Mark Embreehts, “Network-Based Intrusion detection using Neural Networks”,

    Google Scholar 

  2. Ajith Abraham, Ravi Jainb, Johnson Thomas, and Sang Yong Han, “D-SCIDS: Distributed soft computing intrusion detection system”, Journal of Network and Computer Applications, Elsevier, 2005.

    Google Scholar 

  3. Biswanath Mukherjee, Todd L. Heberlin, and Karl N. Levitt. Network intrusion detection. IEEE Network, 8(3):26–41, 1994.

    CrossRef  Google Scholar 

  4. Byunghae Cha, kyung Woo Park and Jaittyun Seo, “Neural Networks Techniques for Host Anomaly Intrusion Detection using Fixed Pattern Transformation. ICCSA 2005, LNCS 3481 pp. 254–263, 2005.

    Google Scholar 

  5. Susan M. Bridges and Rayford B. vaughnn, “Intrusion detection via fuzzy data mining”, Twelfth annual Canadian Information Technology Security Symposium June 19–23. The Ottawa Congress Centre.

    Google Scholar 

  6. Andrew H. Sung and Srinivas Mukkamala, “Identifying important features for intrusion detection using support vector machines and neural networks”. IEEE Proceedings of the 2003 Symposium on Application and the Internet (SAINT’03).

    Google Scholar 

  7. Jonatan Gomez and Dipankar Dasgupa “Evolving Classifiers for Intrusion Detection”, Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2001

    Google Scholar 

  8. John E. Dickerson, Jukka Juslin, Uuramia Koukousoula, and Julie A. Dickerson, “Fuzzy intrusion detection (FIRE)”, Electrical and Computer Engineering Department, IOWA state University, Ames, IA, USA.

    Google Scholar 

  9. Christopher Krungel, Darren Mutz, William Robertson and Fredik Valuer, “Bayesian Event classification for intrusion detection”, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC’03), 2003

    Google Scholar 

  10. Miroslav Kubat and Stan Matwin, “Addressing the curse of Imbalanced Training Sets: One sided selection” Proc. 14th International Conference on Machine Learning, 1997

    Google Scholar 

  11. KDD Cup 1999 Data:

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 International Federation for Information Processing

About this paper

Cite this paper

Adetunmbi Adebayo, O., Shi, Z., Shi, Z., Adewale, O.S. (2006). Network Anomalous Intrusion Detection using Fuzzy-Bayes. In: Shi, Z., Shimohara, K., Feng, D. (eds) Intelligent Information Processing III. IIP 2006. IFIP International Federation for Information Processing, vol 228. Springer, Boston, MA.

Download citation

  • DOI:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-44639-4

  • Online ISBN: 978-0-387-44641-7

  • eBook Packages: Computer ScienceComputer Science (R0)