Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 344-348.

• Information Security • Previous Articles     Next Articles

Research on Intrusion Detection System Method Based on Intuitionistic Fuzzy Sets

XING Rui-kang, LI Cheng-hai   

  1. Air and Missile Defense College,Air Force Engineering University,Xi’an 710051,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: Intrusion detection refers to the technology that collects and analyzes various kinds of data through several key points in a computer network or a computer system,so as to find and respond to possible intrusion attacks.However,due to the variety of attacks in cyberspace and many uncertainties,how to describe and deal with its objective existenceof uncertainty has become an important part of constructing an intrusion detection system model.Intuitionistic fuzzy set theory is a theory that studies the problem of uncertainty in the system.Therefore,studying intrusion detection methods based on intuitionistic fuzzy set theory plays an important role in dealing with a large number of uncertainties in intrusion detection systems.This paper summarized the typical intrusion detection methods based on intuitionistic fuzzy set theory in existing literatures and made a proper analysis and comparison,pointing out the shortcomings in the current related methods and the future development direction,which provide some reference value for further study.

Key words: Comprehensive evaluation, Fuzzy clustering, Fuzzy reasoning, Intrusion detection, Intuitionistic fuzzy

CLC Number: 

  • TP301.6
[1]ATANASSOV K.Intuitionistic fuzzy sets [J].Fuzzy Sets and Systems,1986,20(1):87-96.
[2]ANDERSON J P.Computer security threat monitoring and surveillance[R].PA 19034,USA,1980,4.
[3]DENNING D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222.
[4]SMAHA S E.Haystack:an intrusion detectionsystem[C]∥Ae-rospace Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1988:37.
[5]LUNTTF,JAGANNATHANR,LEER,et al.Knowledge-based intrusion detection[C]∥AI Systems in Government Conference.Piscataway:IEEE Conference Publications,1989:102-103.
[6]HEBERLEIN L T,DIAS G V,LEVITT K N,et al.Anetwork security monitor [C]∥IEEE Computer Society Symposium on Research in Security and Privacy.1990:296-207.
[7]CHEN S S,CHEUNG S,CRAWFORD R H,et al.GrIDS-A Graph Based Intrusion Detection System for Large Networks[C]∥Proceedings of the 19th National Information System Security Conference.1996:56-57.
[8]GUN,BUEHRER.Vague sets are intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1996,79(3):403-405.
[9]BURILLO P,BUSTINCE H.Intuitionistic fuzzy relations (Part I) [J].Mathware Soft Computing,1995,2:5-38.
[10]BUSTINCE H,BURILLO P.Vague sets are intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1996,79(3):403-405.
[11]BUSTINCE H,BURILLO P.Correlation of interval-valued intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1995,74(2):237-244.
[12]EULALIA S,JANUSZ K.A concept of similarity for intuitionistic fuzzy sets and its use in group decision making [C]∥IEEE International Conference on Fuzzy Systems.2004:1129-1134.
[13]EULALIA S,JANUSZ K.Entropy for intuitionistic fuzzy sets [J].Fuzzy Sets and Systems,2001,118(3):467-477.
[14]林琳.直觉模糊集在近似推理与决策中的应用[D].大连:大连理工大学,2006.
[15]雷英杰,王宝树,苗启广.直觉模糊关系及其合成运算[J].系统工程理论与实践,2005,25(2):113-118,133.
[16]XU Z S,CHEN J,WU J J.Clustering algorithm for intuitionistic fuzzy sets [J].Information Sciences,2008(178):3775-3790.
[17]ZHAO F X,MA Z M,YAN L.Fuzzy Clustering Based on Vague Relations[C]∥FSKD 2006.2006:79-88.
[18]雷英杰,王宝树.直觉模糊集时态逻辑算子及扩展运算性质[J].计算机科学,2005,11(32):52-55.
[19]CHEN Y H,MA X L,WU X Y.DDoS Detection Algorithm Based onPreprocessing Network Traffic Predicted Method and Chaos Theory[J].IEEE Communications letters,2013,17(5):1052-1054.
[20]TAN Z Y,JAMDAGNI A,He X J,et al.A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(2):447-456.
[21]FEINSTEIN L,SCHNACKENBERG D,BALUPARI R,et al.Statistical Approaches to DDoS Attack Detection and Response [C]∥Proceedings of the DARPA Information Servivability Conference and Exposition (DISCEX’03).Washington DC:IEEE Computer Society,2003:303-314.
[22]THANASIS V,ALEXANDROS P,CHRISTOS I,et al.Real-time Network Data Analysis Using Time Series Models[J].Simulation Modelling Practice and Theory,2012,29(C):173-180.
[23]张弛,雷英杰,黄孝文.基于直觉模糊推理的入侵检测方法[J].微电子学与计算机,2009,11(26):185-188.
[24]黄孝文,张弛.基于自适应自觉模糊推理的入侵检测方法[J].计算机应用,2010,5(30):1198-1207.
[25]王亚男,叶蓓,雷英杰.基于GA与IFCM聚类算法的入侵检测[J].计算机工程,2013,9(39):170-173.
[26]张国锁,周创明,雷英杰.改进FCM聚类算法及其在入侵检测中的应用[J].计算机应用,2009,29(5):1336-1338.
[27]贺正洪,雷英杰.直觉模糊c-均值聚类算法研究[J].控制与决策,2011,26(6):847-850,856.
[28]贺正洪,雷英杰,王刚.基于直觉模糊聚类的目标识别[J].系统工程与电子技术,2011,33(6):1283-1286.
[29]张弛.基于直觉模糊推理的入侵检测方法研究[D].西安:空军工程大学,2008.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[3] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[4] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[5] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[6] QIAO Ying-jing, GAO Bao-lu, SHI Rui-xue, LIU Xuan, WANG Zhao-hui. Improved FCM Brain MRI Image Segmentation Algorithm Based on Tamura Texture Feature [J]. Computer Science, 2021, 48(8): 111-117.
[7] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[8] CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76.
[9] DAI Zong-ming, HU Kai, XIE Jie, GUO Ya. Ensemble Learning Algorithm Based on Intuitionistic Fuzzy Sets [J]. Computer Science, 2021, 48(6A): 270-274.
[10] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[11] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[12] JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331.
[13] WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348.
[14] LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332.
[15] KANG Bo, PAN Xiao-dong, WANG Hu. Fuzzy Reasoning Method Based on Axiomatic Fuzzy Sets [J]. Computer Science, 2021, 48(11A): 57-62.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!