Skip to main content

Anomaly Detection Using Cooperative Fuzzy Logic Controller

  • Conference paper
Intelligent Robotics Systems: Inspiring the NEXT (FIRA 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 376))

Included in the following conference series:

Abstract

This paper presents an Intrusion Detection System (IDS) with the integration of multi agent systems and artificial intelligence techniques such as fuzzy logic controller (FLC), multi-layer perceptron (MLP) and adaptive neuro-fuzzy inference system (ANFIS). The paper introduces Network Intrusion Detection Systems (NIDS), which monitors the network traffic and detect any possible attacks. The system is made up of three agents: accumulator, analyser and decision maker agents. The accumulator agent works to gather and filter network traffics. The analyser agent uses decision tree (DT) to classify the data. Finally, the decision maker agent uses fuzzy logic controller (FLC) to make the final decision. The proposed system was simulated using KDDCup 1999 dataset and the experimental results show an improvement of the attack detection accuracy to 99.95% and false alarm rate of 1%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anuar, N.B., Papadaki, M., Furnell, S., Clarke, N.: Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Security and Communication Networks, doi: 10.1002/sec.673

    Google Scholar 

  2. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security 28, 18–28 (2009)

    Article  Google Scholar 

  3. Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36, 16–24 (2013)

    Article  Google Scholar 

  4. Mell, P., Hu, V., Lippmann, R., Haines, J., Zissman, M.: An Overview of Issues in Testing Intrusion Detection Systems

    Google Scholar 

  5. Shiaeles, S.N., Katos, V., Karakos, A.S., Papadopoulos, B.K.: Real time DDoS detection using fuzzy estimators. Computers & Security 31, 782–790 (2012)

    Article  Google Scholar 

  6. Weijian, H., Yan, A., Wei, D.: A Multi-Agent-Based Distributed Intrusion Detection System. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE, pp. V3-141–V3-143 (2010)

    Google Scholar 

  7. Shanmugavadivu, R., Nagrajan, D.N.: Network intrusion detection system using fuzzy logic. Indian Journal of Computer Science and Engineering (2011)

    Google Scholar 

  8. Olajubu, E.A., Ajayi, O.A., Aderounmu, G.A.: A fuzzy logic based multi-agents controller. Expert Systems with Applications 38, 4860–4865 (2011)

    Article  Google Scholar 

  9. Abrahams, B., Wei, D.: Architecture for automated annotation and ontology based querying of semantic Web resources. In: Proceedings of The 2005 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 413–417 (2005)

    Google Scholar 

  10. KDD Cup 1999, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  11. Wooldridge, M.: An introduction to multiagent systems. Wiley (2009)

    Google Scholar 

  12. Patel, A., Taghavi, M., Bakhtiyari, K., Celestino Jr., J.: An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 36, 25–41 (2013)

    Article  Google Scholar 

  13. Xue, T., Shi, Z., Huo, J., Wang, D.: Multi-agent based intrusion detection system for wireless sensor networks. In: 2012 IEEE International Conference on Oxide Materials for Electronic Engineering (OMEE), pp. 683–686 (2012)

    Google Scholar 

  14. Shu-Hsien, L.: Expert system methodologies and applications—a decade review from 1995 to 2004. Expert Systems with Applications 28, 93–103 (2005)

    Article  Google Scholar 

  15. Shamshirband, S., Kalantari, S., Daliri, Z., Ng, L.S.: Expert security system in wireless sensor networks based on fuzzy discussion multiagent systems. Sci. Res. Essays 5, 3840–3849 (2010)

    Google Scholar 

  16. Shamshirband, S., Kalantari, S., Bakhshandeh, Z.: Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern. Scientific Research and Essays 5, 592–605 (2010)

    Google Scholar 

  17. Quinlan, J.R.: Induction of decision trees. Machine Learning 1, 81–106 (1986)

    Google Scholar 

  18. Rokach, L., Maimon, O.Z.: Data mining with decision trees: theroy and applications, vol. 69. World Scientific Publishing Company Incorporated (2008)

    Google Scholar 

  19. Anuar, N.B., Sallehudin, H., Gani, A., Zakaria, O.: Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of Computer Science 21, 110–115 (2008)

    Google Scholar 

  20. Xiaohu, W., Lele, W., Nianfeng, L.: An Application of Decision Tree Based on ID3. Physics Procedia 25, 1017–1021 (2012)

    Article  Google Scholar 

  21. Alavala, C.R.: Fuzzy Logic and Neural Networks: Basic Concepts and Applications. New Age International Pvt Ltd Publishers (2008)

    Google Scholar 

  22. Yu, Y., Wu, H.: Anomaly intrusion detection based upon data mining techniques and fuzzy logic. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 514–517 (2012)

    Google Scholar 

  23. Kumar, S., Jain, S.: Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1, 352–356 (2012)

    Google Scholar 

  24. Panda, M., Abraham, A., Patra, M.R.: A Hybrid Intelligent Approach for Network Intrusion Detection. Procedia Engineering 30, 1–9 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feizollah, A., Shamshirband, S., Anuar, N.B., Salleh, R., Mat Kiah, M.L. (2013). Anomaly Detection Using Cooperative Fuzzy Logic Controller. In: Omar, K., et al. Intelligent Robotics Systems: Inspiring the NEXT. FIRA 2013. Communications in Computer and Information Science, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40409-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40409-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40408-5

  • Online ISBN: 978-3-642-40409-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics