• DocumentCode
    255167
  • Title

    A fuzzy Intrusion Detection System based on categorization of attacks

  • Author

    Varshovi, A. ; Rostamipour, M. ; Sadeghiyan, B.

  • Author_Institution
    Dept. of Comput. Eng. & Inf. Technol., Amirkabir Univ. of Technol., Tehran, Iran
  • fYear
    2014
  • fDate
    27-29 May 2014
  • Firstpage
    50
  • Lastpage
    55
  • Abstract
    Intrusion Detection Systems (IDS) play a key role in defence against variety of cyber attacks in computer systems and network environments. However, modern DoS attacks that blend normal and malicious network traffic, significantly increase the rate of false alarms, hence challenge the effectiveness of IDS. In this paper, we propose a fuzzy IDS to address the uncertainty problem in distinguishing between normal and malicious network traffic. The proposed fuzzy detection engine implements a taxonomy of DoS attacks in a decision-tree structure, to combine expert knowledge and machine intelligence. The introduction of fuzziness in misuse patterns makes it possible to focus on category of attacks rather than crisp attack thresholds which are easily bypassed by slight variations in attack methods. On the other hand, our approach is different from anomaly detection, since our defined categories are more detailed than just normal and abnormal. The proposed system is tested experimentally against KDD Cup 99 intrusion detection dataset. Comparing to other related works, our system exhibited a detection rate of 99.91%,while only produced around 1600 false alarms in more than 5 million test sessions, against DoS flooding attacks, where just a reduced number of features employed.
  • Keywords
    computer network security; decision trees; fuzzy set theory; telecommunication traffic; DoS flooding attacks; KDD Cup 99 intrusion detection dataset; attacks categorization; computer systems; cyber attacks; decision-tree structure; expert knowledge; fuzzy IDS; fuzzy detection engine; fuzzy intrusion detection system; machine intelligence; malicious network traffic; misuse patterns; modern DoS attacks; network environments; normal network traffic; uncertainty problem; Protocols; Taxonomy; Classification; Denial of Service; Fuzzy Intrusion Detection; Network Security; Taxonomy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information and Knowledge Technology (IKT), 2014 6th Conference on
  • Conference_Location
    Shahrood
  • Print_ISBN
    978-1-4799-5658-6
  • Type

    conf

  • DOI
    10.1109/IKT.2014.7030332
  • Filename
    7030332