Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 403))

Abstract

In this chapter, a novel intrusion detection system has been proposed which is based on the fuzzy min max neural network. The objective of the proposed intrusion detection system is to protect the end user system from the cope of various types of cyberattacks. The main hurdles in the today’s intrusion detections system are the nonlinear separablity, online adaption, preprocessing of the network logs, attribute selection, and the learning of the desired system for the anomalous or the signature detection. The proposed system is tested on the KDD Cup 99 dataset, and the classification accuracy and classification error are used for performance evaluation. The critical experiment on the proposed system gives the superior performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rao HR (ed) (2007) Managing information assurance in financial services. IGI Global

    Google Scholar 

  2. Vokorokos L, Ennert M, Radušovský J (2014) A survey of parallel intrusion detection on graphical processors. Cent Eur J Comp Sci 4(4):222–230

    Google Scholar 

  3. http://www.isaca.org/Journal/Past-Issues/2006/Volume-1/Pages/JOnline-Network-Intrusion-Detection-Know-What-You-Do-Not-Need.aspx#f1. Accessed on 18 Feb 2015

  4. Azad C, Jha VK (2013) Data mining in intrusion detection: a comparative study of methods, types and data sets. Int J Info Technol Comput Sci (IJITCS) 5(8):75

    Google Scholar 

  5. Liao HJ, Lin CHR, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Network Comput Appl 36(1):16–24

    Article  Google Scholar 

  6. Yang H, Li T, Hu X, Wang F, Zou Y (2014) A survey of artificial immune system based intrusion detection. Sci World J

    Google Scholar 

  7. Elshoush HT, Osman IM (2011) Alert correlation in collaborative intelligent intrusion detection systems—a survey. Appl Soft Comput 11(7):4349–4365

    Article  Google Scholar 

  8. Chari SN, Cheng PC (2003) BlueBox: a policy-driven, host-based intrusion detection system. ACM Trans Info Syst Sec (TISSEC) 6(2):173–200

    Article  Google Scholar 

  9. Gautam SK, Om H (2015) Multivariate linear regression model for host based intrusion detection. In: Computational intelligence in data mining, vol 3. Springer, India, pp 361–371

    Google Scholar 

  10. Vigna G, Kemmerer RA (1999) NetSTAT: a network-based intrusion detection system. J Comput Sec 7(1):37–71

    Article  Google Scholar 

  11. Joshi SA, Pimprale VS (2013) Network intrusion detection system (NIDS) based on data mining. Int J En Sci Innovative Technol (IJESIT) 2

    Google Scholar 

  12. Ragsdale DJ, Carver CA, Humphries JW, Pooch UW (2000) Adaptation techniques for intrusion detection and intrusion response systems. In: IEEE international conference on systems, man, and cybernetics, vol. 4, pp 2344–2349

    Google Scholar 

  13. http://en.wikipedia.org/wiki/Internet_traffic

  14. Liao S-H, Chu P-H, Hsiao P-Y (2012) Data mining techniques and applications–a decade review from 2000 to 2011. Expert Syst Appl 39(12):11303–11311

    Article  Google Scholar 

  15. Julisch K (2002) Data mining for intrusion detection. Applications of data mining in computer security. Springer, US, pp 33–62

    Book  Google Scholar 

  16. Azad C, Jha VK (2014) Data mining based hybrid intrusion detection system. Indian J Sci Technol 7(6):781–789

    Google Scholar 

  17. Chen T, Zhang X, Jin S, Kim O (2014) Efficient classification using parallel and scalable compressed model and its application on intrusion detection. Expert Syst Appl 41(13):5972–5983

    Article  Google Scholar 

  18. Gu B, Guo H (2014) The intrusion detection system based on a novel association rule. In: International conference on information science, electronics and electrical engineering (ISEEE), vol. 2, pp 1313–1316

    Google Scholar 

  19. Tong Xiaojun, Wang Zhu, Haining Yu (2009) A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Comput Phys Commun 180(10):1795–1801

    Article  Google Scholar 

  20. Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232

    Article  Google Scholar 

  21. Lei JZ, Ghorbani AA (2012) Improved competitive learning neural networks for network intrusion and fraud detection. Neurocomputing 75(1):135–145

    Article  Google Scholar 

  22. Shun J, Malki HA (2008) Network intrusion detection system using neural networks. In: Fourth international conference on natural computation ICNC’08, vol. 5, pp 242–246

    Google Scholar 

  23. Sarasamma ST, Zhu QA, Huff J (2005) Hierarchical Kohonenen net for anomaly detection in network security. Syst Man Cybern Part B: Cybern IEEE Trans 35(2):302–312

    Article  Google Scholar 

  24. Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: International joint conference on neural networks, pp 1827–1834

    Google Scholar 

  25. Joo D, Hong T, Han I (2003) The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Syst Appl 25(1):69–75

    Article  Google Scholar 

  26. Zhou ZH, Jiang Y (2004) NeC4. 5: neural ensemble based C4. 5. IEEE Trans Knowl Data Eng 16(6):770–773

    Article  Google Scholar 

  27. Sindhu S, Siva S, Geetha S, Kannan A (2012) Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1):129–141

    Article  MATH  Google Scholar 

  28. Simpson PK (1992) Fuzzy min-max neural networks. I. classification. IEEE Trans Neural Networks 3(5):776–786

    Article  Google Scholar 

  29. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11(1):10–18

    Article  Google Scholar 

  30. Pfahringer B (2000) Winning the KDD99 classification cup: bagged boosting. ACM SIGKDD Explorations Newsletter 1(2):65–66

    Article  Google Scholar 

  31. Levin I (2000) KDD-99 classifier learning contest: LLSoft’s results overview. SIGKDD Explorations 1(2):67–75

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jha Vijay Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chandrashekhar, A., Vijay Kumar, J. (2017). Fuzzy Min-Max Neural Network-Based Intrusion Detection System. In: Nath, V. (eds) Proceedings of the International Conference on Nano-electronics, Circuits & Communication Systems. Lecture Notes in Electrical Engineering, vol 403. Springer, Singapore. https://doi.org/10.1007/978-981-10-2999-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2999-8_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2998-1

  • Online ISBN: 978-981-10-2999-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics