A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

被引:111
作者
Masdari, Mohammad [1 ]
Khezri, Hemn [2 ]
机构
[1] Islamic Azad Univ, Urmia Branch, Comp Engn Dept, Orumiyeh, Iran
[2] Afagh Higher Educ Inst, Comp Engn Dept, Orumiyeh, Iran
关键词
Intrusion detection; Fuzzy logic; ANFIS; FCM; Feature selection; Neuro-fuzzy; GENETIC ALGORITHM; C-MEANS; NETWORK; OPTIMIZATION; MODEL; SET;
D O I
10.1016/j.asoc.2020.106301
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Organizations that benefit from information technologies are vulnerable to various attacks and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of defense which in conjunction with firewalls and other security components are applied to deal with intrusions and unauthorized misbehaviors. Misuse detection is one of the main branches of the intrusion detection which intends to prevent known security attacks regarding their previously known signatures. This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques to deal with different kinds of intrusions. For this purpose, it first presents the key points and knowledge about intrusion detection and then classifies the fuzzy misuse detection approaches regarding their applied fuzzy techniques and algorithms. Then, it illustrates the major contributions of the fuzzy IDS schemes and illuminates their merits and limitations. Besides, in each section, the comparison of their applied datasets, performance evaluation factors, feature extraction methods as well as the type of fuzzy logic controller (FLC) and membership functions are provided. Finally, the concluding issues and the directions for future researches are highlighted. (C) 2020 Published by Elsevier B.V.
引用
收藏
页数:19
相关论文
共 103 条
[1]   Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems [J].
Acampora, Giovanni .
SOFT COMPUTING, 2012, 16 (07) :1183-1196
[2]  
Almseidin M., 2019, ARXIV190408790
[3]   An improved Android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (EHNFC) and permission-based features [J].
Altaher, Altyeb .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (12) :4147-4157
[4]  
[Anonymous], 2017, 2017 INT C ENG MIS I, DOI DOI 10.1109/ICEMIS.2017.8273113
[5]  
[Anonymous], 2015, 2015 INT C TECHN SUS
[6]  
[Anonymous], 2013, Computer Communication and Informatics (ICCCI), 2013 International Conference on, DOI DOI 10.1080/21681724.2013.853370
[7]  
[Anonymous], 2018, 2018 INT JOINT C NEU
[8]  
[Anonymous], COMPUT ELECT ENG
[9]  
[Anonymous], 2016, 2016 INT C ENG MIS I
[10]  
[Anonymous], 2015, 2015 IEEE ACS 12 INT