Application of Fuzzy Logic in Computer Security and Forensics

Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 394)

Abstract

Due to the growing reliance that corporations and government agencies place on their computer networks, the significance of defending these systems from attack cannot be underestimated. A single malicious encroachment into a computer network can cause a great deal of damage to an organisation. Computer Security concerns the protection of information and property from misuse by unauthorized people. Computer forensics provides methods for the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the reconstruction of criminal activities or policy violation. Fuzzy logic can properly be used to help deal with issues associated with computer security and computer forensics. This chapter deals with the use of fuzzy logic in computer security and forensics, providing a general overview of some of its applications, recent algorithms, abilities, advantages and drawbacks.

Keywords

Membership Function Fuzzy Logic Fuzzy System Fuzzy Rule Intrusion Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zadeh, L.A.: Outline of a new approach to the analysis of complex system and decision processes. IEEE Transactions on Systems Man and Cybernetics 3, 28–44 (1973)CrossRefMATHMathSciNetGoogle Scholar
  2. 2.
    Zadeh, L.A.: Fuzzy sets. Information and Control 8, 338–353 (1965)CrossRefMATHMathSciNetGoogle Scholar
  3. 3.
    Negnevitsky, M.: Artificial Intelligence: A guide to intelligent systems. Pearson Education Limited, Essex (2005)Google Scholar
  4. 4.
    Chen, G., Pham, T.: Introduction to fuzzy sets, fuzzy logic, and fuzzy control systems. CRC Press, Washington (2001)Google Scholar
  5. 5.
    Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and Applications. Prentice Hall PTR, New Jersey (1995)MATHGoogle Scholar
  6. 6.
    Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part I. Information Sciences 8, 199–249 (1975)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part II. Information Sciences 8, 301–357 (1975)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part III. Information Sciences 9, 43–80 (1975)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Herrera, F., Alonso, S., Chiclana, F., Herrera-Viedma, E.: Computing with Words in Decision Making: Foundations. Trends and Prospects Fuzzy Optimization and Decision Making 8, 337–364 (2009)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Dubois, D., Ostasiewicz, W., Prade, H.: Fuzzy sets: history and basic notions. In: Dubois, D., Prade, H. (eds.) Fundamentals of Fuzzy Sets. Kluwer Academic Publishers (2000)Google Scholar
  11. 11.
    Mendel, J.M.: Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions. Prentice Hall, Upper Saddle River (2001)MATHGoogle Scholar
  12. 12.
    Belman, R., Giertz, M.: On the analytic formalism of the theory of fuzzy sets. Information Science 5, 149–156 (1973)CrossRefGoogle Scholar
  13. 13.
    Berenji, H.R.: Fuzzy logic controllers. In: Yager, R.R., Zadeh, L.A. (eds.) An Introduction to Fuzzy Logic Applications in Intelligent Systems. Kluwer Academic Publishers (1992)Google Scholar
  14. 14.
    Heydeman, J., Reijntjes, R., Babuska, R., Kaymak, U., Van Nauta Lemke, H.: Fuzzy Logic Based Security Assessment of Power Networks. Intelligent Systems Applications to Power Systems 2(9), 405–409 (1996)Google Scholar
  15. 15.
    Gomez, J., Dasgupta, D.: Evolving Fuzzy Classifiers for Intrusion Detection. In: Proceedings of 2002 IEEE Workshop on Information Assurance. United States Military Academy, IEEE, West Point, NY (2002)Google Scholar
  16. 16.
    Miller, S.: Wi-Fi Security. McGraw-Hill, New York (2003)Google Scholar
  17. 17.
    McGill, W., Ayyub, B.: A Multicriteria Security System Performance Assessment Using Fuzzy Logic. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4(4), 484–504 (2007)CrossRefGoogle Scholar
  18. 18.
    Luo, J.: Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection. Unpublished MSc. thesis. Mississippi State University (1999)Google Scholar
  19. 19.
    Dickerson, J.E., Dickerson, J.A.: Fuzzy Network Profiling for Intrusion Detection. In: 19th International Conference of the North American Fuzzy Information Processing Society, pp. 301–306. IEEE, Atlanta (2000)Google Scholar
  20. 20.
    Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy Intrusion Detection. In: Joint 9th IFSA World Congress and 20th NAFIPS International Conference, 2001, Vancouver, pp. 1506–1510. IEEE, Piscataway (2001)Google Scholar
  21. 21.
    Zhang, B., Yin, J., Hag, J.: Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. In: Wang, L., Jin, Y. (eds.) Fuzzy Systems and Knowledge Discovery, pp. 629–634. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  22. 22.
    Yao, L., ZhiTang, L., Shuyu, L.: A Fuzzy Anomaly Detection Algorithm for IPv6. In: Second IEEE International Conference on Semantics, Knowledge and Grid, SKG 2006, Guilin, Guangxi, China, pp. 67–70 (2006)Google Scholar
  23. 23.
    Xin, J., Dickerson, J.E., Dickerson, J.A.: Fuzzy feature extraction and visualization for intrusion detection. In: 12th IEEE International Conference on Fuzzy Systems, 2003, pp. 1249–1254. IEEE, St. Louis. MO. (2003)Google Scholar
  24. 24.
    Meyers, M.: Computer Forensics: Towards Creating A Certification Framework. Unpublished MSc. thesis. Purdue University (2005)Google Scholar
  25. 25.
    Johansson, C.: Computer Forensic Text Analysis with Open Source Software. Unpublished MSc. thesis. Blekinge Institute of Technology (2003)Google Scholar
  26. 26.
    Kim, J., Kim, D., Noh, B.: A Fuzzy Logic Based Expert System as a Network Forensics. In: IEEE International Conference on Fuzzy Systems 2004, Budapest, pp. 879–884 (2004)Google Scholar
  27. 27.
    Wai, H.: Research in Computer Forensics. Unpublished MSc. thesis. Naval Postgraduate School (2002)Google Scholar
  28. 28.
    Pan, L., Savoldi, A., Gubian, B., Batten, L.: Measure of Integrity Leakage in Live Forensic Context. In: 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing Harbin, China, pp. 534–537 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Software Technology Research Laboratory (STRL), Department of Computer TechnologyDe Montfort UniversityLeicesterUnited Kingdom
  2. 2.Centre for Computational Intelligence, Dept. of InformaticsDe Montfort UniversityLeicesterUnited Kingdom
  3. 3.Computer Forensics and Security Group, Department of Computer TechnologyDe Montfort UniversityLeicesterUnited Kingdom

Personalised recommendations