In real world, administrators recognize system intrusions through a procedure that can be best explained by the granular computing concepts. This is due to the fact that discrimination between normal and abnormal behavior is not sharply defined. Moreover, the granules in which the incoming requests may be granulated are neither disjoint nor well-defined. This signifies the existence of degrees of uncertainty in the process of intrusion detection. Toward the aim of manipulating and minimizing the effects of uncertainties in the system, we have proposed an algorithm that, based on distributed-interval type-2 fuzzy sets, analyses anomalous behavior trends of system parameters. Based on the analysis results, the system's incoming requests would be treated accordingly.

Distributed-Interval Type-2 Fuzzy Set Based Recognition Algorithm for IDS / H. Tahayori, A. Visconti - In: Granular Computing, 2008. GrC 2008. IEEE International Conference on / [a cura di] T.Y. Lin, X. Hu, Q. Liu, X. Shen, J. Xia, J. Wang. - Piscataway : IEEE, 2008. - ISBN 9781424425129. - pp. 572-575 (( convegno IEEE International Conference on Granular Computing tenutosi a Hangzhou nel 2008 [10.1109/GRC.2008.4664714].

Distributed-Interval Type-2 Fuzzy Set Based Recognition Algorithm for IDS

H. Tahayori
Primo
;
A. Visconti
Ultimo
2008

Abstract

In real world, administrators recognize system intrusions through a procedure that can be best explained by the granular computing concepts. This is due to the fact that discrimination between normal and abnormal behavior is not sharply defined. Moreover, the granules in which the incoming requests may be granulated are neither disjoint nor well-defined. This signifies the existence of degrees of uncertainty in the process of intrusion detection. Toward the aim of manipulating and minimizing the effects of uncertainties in the system, we have proposed an algorithm that, based on distributed-interval type-2 fuzzy sets, analyses anomalous behavior trends of system parameters. Based on the analysis results, the system's incoming requests would be treated accordingly.
Settore INF/01 - Informatica
2008
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
04664714.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 130.13 kB
Formato Adobe PDF
130.13 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/46519
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact