D-SCIDS: Distributed soft computing intrusion detection system

被引:77
作者
Abraham, Ajith [1 ]
Jain, Ravi
Thomas, Johnson
Han, Sang Yong
机构
[1] Chung Ang Univ, Sch Comp Sci & Engn, Seoul, South Korea
[2] Univ S Australia, Adelaide, SA 5001, Australia
[3] Oklahoma State Univ, Dept Comp Sci, Stillwater, OK 74106 USA
关键词
D O I
10.1016/j.jnca.2005.06.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. A Distributed IDS (DIDS) consists of several IDS over a large network(s), all of which communicate with each other, or with a central server that facilitates advanced network monitoring. In a distributed environment, DIDS are implemented using co-operative intelligent agents distributed across the network(s). This paper evaluates three fuzzy rule-based classifiers to detect intrusions in a network. Results are then compared with other machine learning techniques like decision trees, support vector machines and linear genetic programming. Further, we modeled Distributed Soft Computing-based IDS (D-SCIDS) as a combination of different classifiers to model lightweight and more accurate (heavy weight) IDS. Empirical results clearly show that soft computing approach could play a major role for intrusion detection. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:81 / 98
页数:18
相关论文
共 40 条
[1]  
Abraham A, 2004, LECT NOTES COMPUT SC, V3326, P252
[2]  
ABRAHAM A, 2004, STUDIES FUZZINESS SO, P189
[3]  
ABRAHAM A, 2005, APPL INFORM SYSTEMS, P105
[4]  
[Anonymous], METHODOLOGIES CONCEP
[5]  
Barbará D, 2001, SIGMOD RECORD, V30, P15, DOI 10.1145/604264.604268
[6]  
Bernardes MC, 2000, INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, P158, DOI 10.1109/PDSE.2000.847862
[7]  
Brieman L., 1984, WADSWORTH INC
[8]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[9]  
COHEN W, 1996, LEARNIGN TREES RULES
[10]   Security and human computer interfaces [J].
Johnston, J ;
Eloff, JHP ;
Labuschagne, L .
COMPUTERS & SECURITY, 2003, 22 (08) :675-684