Abstract
This paper presents an Intrusion Detection System (IDS) with the integration of multi agent systems and artificial intelligence techniques such as fuzzy logic controller (FLC), multi-layer perceptron (MLP) and adaptive neuro-fuzzy inference system (ANFIS). The paper introduces Network Intrusion Detection Systems (NIDS), which monitors the network traffic and detect any possible attacks. The system is made up of three agents: accumulator, analyser and decision maker agents. The accumulator agent works to gather and filter network traffics. The analyser agent uses decision tree (DT) to classify the data. Finally, the decision maker agent uses fuzzy logic controller (FLC) to make the final decision. The proposed system was simulated using KDDCup 1999 dataset and the experimental results show an improvement of the attack detection accuracy to 99.95% and false alarm rate of 1%.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Anuar, N.B., Papadaki, M., Furnell, S., Clarke, N.: Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Security and Communication Networks, doi: 10.1002/sec.673
García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security 28, 18–28 (2009)
Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36, 16–24 (2013)
Mell, P., Hu, V., Lippmann, R., Haines, J., Zissman, M.: An Overview of Issues in Testing Intrusion Detection Systems
Shiaeles, S.N., Katos, V., Karakos, A.S., Papadopoulos, B.K.: Real time DDoS detection using fuzzy estimators. Computers & Security 31, 782–790 (2012)
Weijian, H., Yan, A., Wei, D.: A Multi-Agent-Based Distributed Intrusion Detection System. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE, pp. V3-141–V3-143 (2010)
Shanmugavadivu, R., Nagrajan, D.N.: Network intrusion detection system using fuzzy logic. Indian Journal of Computer Science and Engineering (2011)
Olajubu, E.A., Ajayi, O.A., Aderounmu, G.A.: A fuzzy logic based multi-agents controller. Expert Systems with Applications 38, 4860–4865 (2011)
Abrahams, B., Wei, D.: Architecture for automated annotation and ontology based querying of semantic Web resources. In: Proceedings of The 2005 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 413–417 (2005)
KDD Cup 1999, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Wooldridge, M.: An introduction to multiagent systems. Wiley (2009)
Patel, A., Taghavi, M., Bakhtiyari, K., Celestino Jr., J.: An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 36, 25–41 (2013)
Xue, T., Shi, Z., Huo, J., Wang, D.: Multi-agent based intrusion detection system for wireless sensor networks. In: 2012 IEEE International Conference on Oxide Materials for Electronic Engineering (OMEE), pp. 683–686 (2012)
Shu-Hsien, L.: Expert system methodologies and applications—a decade review from 1995 to 2004. Expert Systems with Applications 28, 93–103 (2005)
Shamshirband, S., Kalantari, S., Daliri, Z., Ng, L.S.: Expert security system in wireless sensor networks based on fuzzy discussion multiagent systems. Sci. Res. Essays 5, 3840–3849 (2010)
Shamshirband, S., Kalantari, S., Bakhshandeh, Z.: Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern. Scientific Research and Essays 5, 592–605 (2010)
Quinlan, J.R.: Induction of decision trees. Machine Learning 1, 81–106 (1986)
Rokach, L., Maimon, O.Z.: Data mining with decision trees: theroy and applications, vol. 69. World Scientific Publishing Company Incorporated (2008)
Anuar, N.B., Sallehudin, H., Gani, A., Zakaria, O.: Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of Computer Science 21, 110–115 (2008)
Xiaohu, W., Lele, W., Nianfeng, L.: An Application of Decision Tree Based on ID3. Physics Procedia 25, 1017–1021 (2012)
Alavala, C.R.: Fuzzy Logic and Neural Networks: Basic Concepts and Applications. New Age International Pvt Ltd Publishers (2008)
Yu, Y., Wu, H.: Anomaly intrusion detection based upon data mining techniques and fuzzy logic. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 514–517 (2012)
Kumar, S., Jain, S.: Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1, 352–356 (2012)
Panda, M., Abraham, A., Patra, M.R.: A Hybrid Intelligent Approach for Network Intrusion Detection. Procedia Engineering 30, 1–9 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Feizollah, A., Shamshirband, S., Anuar, N.B., Salleh, R., Mat Kiah, M.L. (2013). Anomaly Detection Using Cooperative Fuzzy Logic Controller. In: Omar, K., et al. Intelligent Robotics Systems: Inspiring the NEXT. FIRA 2013. Communications in Computer and Information Science, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40409-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-40409-2_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40408-5
Online ISBN: 978-3-642-40409-2
eBook Packages: Computer ScienceComputer Science (R0)