Towards fuzzy anomaly detection-based security: a comprehensive review

被引:22
|
作者
Masdari, Mohammad [1 ]
Khezri, Hemn [2 ]
机构
[1] Islamic Azad Univ, Comp Engn Dept, Urmia Branch, Orumiyeh, Iran
[2] Afagh Higher Educ Inst, Comp Engn Dept, Orumiyeh, Iran
关键词
Anomaly detection; ANFIS; Fuzzy logic; FCM; Feature selection; Neuro-fuzzy; INTRUSION-DETECTION; DETECTION SYSTEM; GENETIC ALGORITHM; C-MEANS; NETWORK; MANAGEMENT; ATTACKS;
D O I
10.1007/s10700-020-09332-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the data security context, anomaly detection is a branch of intrusion detection that can detect emerging intrusions and security attacks. A number of anomaly detection systems (ADSs) have been proposed in the literature that using various algorithms and techniques try to detect the intrusions and anomalies. This paper focuses on the ADS schemes which have applied fuzzy logic in combination with other machine learning and data mining techniques to deal with the inherent uncertainty in the intrusion detection process. For this purpose, it first presents the key knowledge about intrusion detection systems and then classifies the fuzzy ADS approaches regarding their utilized fuzzy algorithm. Afterward, it summarizes their major contributions and illuminates their advantages and limitations. Finally, concluding issues and directions for future researches in the fuzzy ADS context are highlighted.
引用
收藏
页码:1 / 49
页数:49
相关论文
共 50 条
  • [1] Towards fuzzy anomaly detection-based security: a comprehensive review
    Mohammad Masdari
    Hemn Khezri
    Fuzzy Optimization and Decision Making, 2021, 20 : 1 - 49
  • [2] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    APPLIED SOFT COMPUTING, 2020, 92 (92)
  • [3] Review of the Deep Learning Models for Anomaly Detection-Based Video Scrutiny System
    Kukade, Jyoti
    Panse, Prashant
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 235 - 252
  • [4] Anomaly detection based on fuzzy rules
    Jiao W.
    Li Q.
    International Journal of Performability Engineering, 2018, 14 (02) : 376 - 385
  • [5] Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach
    Houichi, Mehdi
    Jaidi, Faouzi
    Bouhoula, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (01): : 393 - 441
  • [6] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [7] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [8] Security protocols protection based on anomaly detection
    Alharby, A
    Imai, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (01): : 189 - 200
  • [9] A comprehensive survey on network anomaly detection
    Fernandes, Gilberto
    Rodrigues, Joel J. P. C.
    Carvalho, Luiz Fernando
    Al-Muhtadi, Jalal F.
    Proenca, Mario Lemes, Jr.
    TELECOMMUNICATION SYSTEMS, 2019, 70 (03) : 447 - 489
  • [10] Anomaly Detection-Based UE-Centric Inter-Cell Interference Suppression
    Park, Kwonyeol
    Choi, Hyuckjin
    Ko, Beomsoo
    Kim, Minje
    Lee, Gyoseung
    Kwon, Daecheol
    Park, Hyunjae
    Kim, Byungseung
    Shin, Min-Ho
    Choi, Junil
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 1512 - 1527