Exploiting Timed Automata-based Fuzzy Controllers and data mining to detect computer network intrusions

G. Acampora
{"title":"Exploiting Timed Automata-based Fuzzy Controllers and data mining to detect computer network intrusions","authors":"G. Acampora","doi":"10.1109/FUZZY.2010.5584893","DOIUrl":null,"url":null,"abstract":"A Network Intrusion Detection System is a network monitoring framework that tries to detect malicious network activity such as port scans, denial of service or other attempts to crack computer network environments. The main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by external penetrators. In real life, however, temporal changes in network intrusion patterns and characteristics tend to invalidate the usability of existing intrusion detection systems. In order to solve this drawback, our paper introduces a novel kind of fuzzy controller, known as Timed Automata-based Fuzzy Controllers, and it presents a data mining approach able to learn the most suitable controller that manages, in efficient way, the computer network dynamism and support networks' administrators to prevent eventual damages coming from unauthorized network intrusion.","PeriodicalId":377799,"journal":{"name":"International Conference on Fuzzy Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Fuzzy Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUZZY.2010.5584893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

A Network Intrusion Detection System is a network monitoring framework that tries to detect malicious network activity such as port scans, denial of service or other attempts to crack computer network environments. The main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by external penetrators. In real life, however, temporal changes in network intrusion patterns and characteristics tend to invalidate the usability of existing intrusion detection systems. In order to solve this drawback, our paper introduces a novel kind of fuzzy controller, known as Timed Automata-based Fuzzy Controllers, and it presents a data mining approach able to learn the most suitable controller that manages, in efficient way, the computer network dynamism and support networks' administrators to prevent eventual damages coming from unauthorized network intrusion.
利用时间自动机模糊控制器和数据挖掘技术检测计算机网络入侵
网络入侵检测系统是一个网络监控框架,它试图检测恶意网络活动,如端口扫描、拒绝服务或其他试图破解计算机网络环境的尝试。入侵检测的主要目的是识别外部渗透者对计算机的未经授权使用、误用和滥用。然而,在现实生活中,网络入侵模式和特征的时间变化往往会使现有入侵检测系统的可用性失效。为了解决这一缺陷,本文引入了一种新的模糊控制器,即基于时间自动机的模糊控制器,并提出了一种数据挖掘方法,该方法能够学习最合适的控制器,有效地管理计算机网络的动态,并支持网络管理员防止未经授权的网络入侵造成的最终损害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信