Skip to main content

Abstract

Intrusion detection is a field of computer security that deals with detecting unauthorized network activities. An intrusion detection system is needed to identify all forms of malicious network traffic and computer activity that a traditional firewall cannot detect. Artificial Intelligence is an area of computing that explores how to create knowledge-based software that can successfully do tasks that humans can now do better. Expert systems, fuzzy logic, and neural networks are among the most recent developments in the field of artificial intelligence. Network Intrusion Detection Systems have been created and extensively researched in order to relieve the problem and detect malicious activity as early as possible. The fact that there are often no clear borders between normal and abnormal network traffic, that there is noisy or contains incorrect data, and that the analyzed traffic might represent both attack and normal communication, is a typical problem in this area. When compared with other techniques, fuzzy logic-based solutions may be beneficial because of their capacity to establish precise membership levels in multiple classes and perform various operations with outcomes that ensure reduced false positive and false negative categorization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Network security., https://www.open.edu/openlearn/science-maths-technology/computing-and-ict/systems-computer/network-security/content-section-9.4. Last accessed 27 Sept 2021

  2. Scarfone, K., Hoffman, P.: Guidelines on Firewalls and Firewall Policy, https://www.govinfo.gov/content/pkg/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855/pdf/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855.pdf. Last accessed 27 Sept 2021

  3. What Is an Intrusion Detection System? Latest Types and Tools, https://www.dnsstuff.com/intrusion-detection-system. Last accessed 27 Sept 2021

  4. Bandakkanavar, R.: Intrusion detection system, https://krazytech.com/technical-papers/intrusion-detection-and-avoidance-system. Last accessed 27 Sept 2021

  5. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS), https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-94.pdf. Last accessed 27 Sept 2021

  6. Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)

    Article  Google Scholar 

  7. Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing cyber threats. Massive computing, vol. 5. Springer, Boston (2005)

    Google Scholar 

  8. Kanimozhi, V., Prem Jacob, T.: Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express. 5(3), 211–214 (2019)

    Article  Google Scholar 

  9. Johanyák, Z.C.: Fuzzy logic based network intrusion detection systems. In: 2020 IEEE 18th world symposium on applied machine intelligence and informatics proceedings, (SAMI), pp. 15–16. Herlany, Slovakia (2020)

    Google Scholar 

  10. Zadeh, L.A.: Fuzzy logic. Neural networks and soft computing. Commun. ACM. 37, 77–84 (1994)

    Article  Google Scholar 

  11. Córdova, D., Fabián, J., Edisson Molina, C., Navarrete, P.: Fuzzy logic and financial risk. A proposed classification of financial risk to the cooperative sector. Contaduría y administración. 62(5), 1687–1703 (2017)

    Article  Google Scholar 

  12. Saad-Falcon, A.: Sensor technology sometimes requires ‘fuzzy logic’, https://www.ishn.com/articles/112736-industrial-safety-monitoring-using-fuzzy-information. Last accessed 22 Sept 2021

  13. Shanmugavadivu, R., Nagarajan, N.: Network intrusion detection system using fuzzy logic. Indian J. Comp. Sci. Eng. 2(1), 101–111 (2011)

    Google Scholar 

  14. El-Hajj, W., Aloul, F., Trabelsi, Z., Zaki, N.: On detecting port scanning using fuzzy based intrusion detection system. In: Proceedings of 2008 international wireless communications and mobile computing conference, pp. 105–110 (2008)

    Google Scholar 

  15. Čisar, P., Maravić Čisar, S.: EWMA statistics and fuzzy logic in function of network anomaly detection. Facta Universitatis Ser. Electron. Energ. 32(2), 249–265 (2019)

    Article  Google Scholar 

  16. Nyikes, Z., Kovács, T.A., Tokody, D.: In situ testing of rail damages in accordance with Industry 4.0. J. Phys. Conf. Ser.. (1742-6588 1742-6596). 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032

    Article  Google Scholar 

  17. Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater.. (1013-9826 1662-9795). 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286

    Article  Google Scholar 

  18. Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Procedia Manuf.. (2351-9789). 22, 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130

    Article  Google Scholar 

  19. Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Comp. Syst.. (1334-4684 1334-4676). 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanja Maravić Čisar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature B.V.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Čisar, S.M., Čisar, P., Pinter, R. (2022). Fuzzy-Based Intrusion Detection Systems. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-94-024-2174-3_18

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-024-2173-6

  • Online ISBN: 978-94-024-2174-3

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics