Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 2, Issue 8, 2015, Page No: 1-9

A Study on Fuzzy Rules for Intrusion Detection System

Sri. Partha Sarathi Bhattacharjee1, Dr. (Mrs.) Shahin Ara Begum2

1.Research Scholar, Dept. of Comp. Sc.,Assam University, Silchar.
2.Associate Professor, Dept. of Comp. Sc.,Assam University, Silchar

Citation : Sri. Partha Sarathi Bhattacharjee, Dr. (Mrs.) Shahin Ara Begum, A Study on Fuzzy Rules for Intrusion Detection System International Journal of Research Studies in Computer Science and Engineering 2015, 2(8) : 1-9

Abstract

An intrusion detection system (IDS) is used to manage network traffic and monitors for suspicious activity and alerts the system or network administrator. One of the major properties of IDS is to respond for anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS can identify threats in various ways: 1) it detects specific signatures of known threats and protects against malware 2) it detects based on comparing traffic patterns against a baseline and looking for anomalies. 3) There are some IDS that simply generate an alert and 4) Some IDS perform an action or actions in response to a detected threat.

In this paper, we have studied different fuzzy approaches for intrusion detection system specifically for anomaly detection system using Fuzzy set theory and we analyze Fuzzy rule and the fitness function of Genetic algorithmfor anomaly based attack detection.


Download Full paper: Click Here