Abstract
Intrusion detection is a field of computer security that deals with detecting unauthorized network activities. An intrusion detection system is needed to identify all forms of malicious network traffic and computer activity that a traditional firewall cannot detect. Artificial Intelligence is an area of computing that explores how to create knowledge-based software that can successfully do tasks that humans can now do better. Expert systems, fuzzy logic, and neural networks are among the most recent developments in the field of artificial intelligence. Network Intrusion Detection Systems have been created and extensively researched in order to relieve the problem and detect malicious activity as early as possible. The fact that there are often no clear borders between normal and abnormal network traffic, that there is noisy or contains incorrect data, and that the analyzed traffic might represent both attack and normal communication, is a typical problem in this area. When compared with other techniques, fuzzy logic-based solutions may be beneficial because of their capacity to establish precise membership levels in multiple classes and perform various operations with outcomes that ensure reduced false positive and false negative categorization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Network security., https://www.open.edu/openlearn/science-maths-technology/computing-and-ict/systems-computer/network-security/content-section-9.4. Last accessed 27 Sept 2021
Scarfone, K., Hoffman, P.: Guidelines on Firewalls and Firewall Policy, https://www.govinfo.gov/content/pkg/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855/pdf/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855.pdf. Last accessed 27 Sept 2021
What Is an Intrusion Detection System? Latest Types and Tools, https://www.dnsstuff.com/intrusion-detection-system. Last accessed 27 Sept 2021
Bandakkanavar, R.: Intrusion detection system, https://krazytech.com/technical-papers/intrusion-detection-and-avoidance-system. Last accessed 27 Sept 2021
Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS), https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-94.pdf. Last accessed 27 Sept 2021
Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing cyber threats. Massive computing, vol. 5. Springer, Boston (2005)
Kanimozhi, V., Prem Jacob, T.: Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express. 5(3), 211–214 (2019)
Johanyák, Z.C.: Fuzzy logic based network intrusion detection systems. In: 2020 IEEE 18th world symposium on applied machine intelligence and informatics proceedings, (SAMI), pp. 15–16. Herlany, Slovakia (2020)
Zadeh, L.A.: Fuzzy logic. Neural networks and soft computing. Commun. ACM. 37, 77–84 (1994)
Córdova, D., Fabián, J., Edisson Molina, C., Navarrete, P.: Fuzzy logic and financial risk. A proposed classification of financial risk to the cooperative sector. Contaduría y administración. 62(5), 1687–1703 (2017)
Saad-Falcon, A.: Sensor technology sometimes requires ‘fuzzy logic’, https://www.ishn.com/articles/112736-industrial-safety-monitoring-using-fuzzy-information. Last accessed 22 Sept 2021
Shanmugavadivu, R., Nagarajan, N.: Network intrusion detection system using fuzzy logic. Indian J. Comp. Sci. Eng. 2(1), 101–111 (2011)
El-Hajj, W., Aloul, F., Trabelsi, Z., Zaki, N.: On detecting port scanning using fuzzy based intrusion detection system. In: Proceedings of 2008 international wireless communications and mobile computing conference, pp. 105–110 (2008)
Čisar, P., Maravić Čisar, S.: EWMA statistics and fuzzy logic in function of network anomaly detection. Facta Universitatis Ser. Electron. Energ. 32(2), 249–265 (2019)
Nyikes, Z., Kovács, T.A., Tokody, D.: In situ testing of rail damages in accordance with Industry 4.0. J. Phys. Conf. Ser.. (1742-6588 1742-6596). 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032
Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater.. (1013-9826 1662-9795). 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286
Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Procedia Manuf.. (2351-9789). 22, 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130
Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Comp. Syst.. (1334-4684 1334-4676). 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature B.V.
About this paper
Cite this paper
Čisar, S.M., Čisar, P., Pinter, R. (2022). Fuzzy-Based Intrusion Detection Systems. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_18
Download citation
DOI: https://doi.org/10.1007/978-94-024-2174-3_18
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-2173-6
Online ISBN: 978-94-024-2174-3
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)