Title :
Anomaly intrusion detection based on soft computing technique
Author :
Zheng, Ge ; Cao, Qinghua ; Liu, Chao
Author_Institution :
Sch. of Comput. Sci. & Eng., BeiHang Univ., Beijing, China
Abstract :
Soft computing techniques exploit the given tolerance of imprecision, partial truth, and uncertainty for a particular problem. In the process of intrusion detection, imprecision and uncertainty problems also exist. In order to solve these problems, the paper introduces a novel scheme to process sequences of system calls for anomaly intrusion detection based on interval type-2 fuzzy logic. Hidden markov models and normal database of short sequences are utilized to model normal behaviors. Interval type-2 Fuzzy logic system is incorporated to solve the sharp boundary problem and decide whether a sequence is normal or not. Experimental results show that the proposed scheme can effectively detect intrusions and reduce false positive alarms.
Keywords :
fuzzy logic; hidden Markov models; security of data; anomaly intrusion detection; hidden Markov model; interval type-2 fuzzy logic; sharp boundary problem; soft computing technique; Computational modeling; Hidden Markov models; High definition video; anomaly intrusion detection; hidden markov model; interval type-2 fuzzy logic system; soft computing; system calls;
Conference_Titel :
System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2011 International Conference on
Conference_Location :
Guiyang
Print_ISBN :
978-1-4577-0247-1
DOI :
10.1109/ICSSEM.2011.6081303