Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 1
Page No. 136 - 141

An Investigation on Neuro-Fuzzy Based Alert Clustering for Statistical Anomaly of Attack Detection

Authors : K. Saravanan and R. Asokan

References

Ajil, K.S., P.K. Thapliyal, M.V. Shukla, P.K. Pal and P.C. Joshi et al., 2010. A new technique for temperature and humidity profile retrieval from infrared-sounder observations using the adaptive neuro-fuzzy inference system. Geosci. Remote Sens. IEEE. Trans., 48: 1650-1659.
CrossRef  |  Direct Link  |  

Bhuyan, M.H., H.J. Kashyap, D.K. Bhattacharyya and J.K. Kalita, 2014. Detecting distributed denial of service attacks: Methods, tools and future directions. Comput. J., 57: 537-556.
CrossRef  |  

Boppana, R.V. and X. Su, 2010. On the effectiveness of monitoring for intrusion detection in mobile Ad hoc networks. IEEE Trans. Mobile Comput., 10.1109/TMC.2010.210

Dain, O.M. and R.K. Cunningham, 2001. Building scenarios from a heterogeneous alert stream. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, June 5, 2001, West Point, NY, USA., pp: 1-6.

Fadlullah, Z.M., T. Taleb, A.V. Vasilakos, M. Guizani and N. Kato, 2010. DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM. Trans. Netw., 18: 1234-1247.
CrossRef  |  Direct Link  |  

Francois, J., I. Aib and R. Boutaba, 2012. FireCol: A collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking, 20: 1828-1841.
CrossRef  |  

Huang, Y.A., W. Fan, W. Lee and P.S. Yu, 2003. Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, May 19-22, 2003, IEEE, New Jersey, USA., pp: 478-487.

Julisch, K., 2003. Using Root Cause Analysis to Handle Intrusion Detection Alarms. Universitat Dortmund, Dortmund, North Rhine-Westphalia, Germany, Pages: 148.

Khezri, M. and M. Jahed, 2011. A neuro-fuzzy inference system for sEMG-based identification of hand motion commands. Ind. Electron. IEEE. Transac., 58: 1952-1960.
CrossRef  |  Direct Link  |  

Lih, W.C., S.T. Bukkapatnam, P. Rao, N. Chandrasekharan and R. Komanduri, 2008. Adaptive neuro-fuzzy inference system modeling of MRR and WIWNU in CMP process with sparse experimental data. Autom. Sci. Eng. IEEE. Trans., 5: 71-83.
CrossRef  |  Direct Link  |  

Mahajan, R., S.M. Bellovin, S. Floyd, J. Joannidis, V. Paxson and S. Shenker, 2002. Controlling high bandwidth aggregates in the network. J. Comput. Commun. Rev., 32: 62-73.
Direct Link  |  

Ohsita, Y., T. Miyamura, S.I. Arakawa, S. Ata and E. Oki et al., 2010. Gradually reconfiguring virtual network topologies based on estimated traffic matrices. IEEE/ACM. Trans. Netw., 18: 177-189.
CrossRef  |  Direct Link  |  

Perdisci, R., G. Giacinto and F. Roli, 2006. Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intelli., 19: 429-438.
CrossRef  |  

Pietraszek, T., 2004. Using adaptive alert classification to reduce false positives in intrusion detection. Recent Adv. Intrusion Detection Proc., 3224: 102-124.

Roesch, M., 1999. Snort: Lightweight Intrusion Detection for Networks. Proceedings of the 13th USENIX conference on System Administration, November 7-12, 1999, Seattle, Washington, USA., pp: 229-238.

Wei, W., F. Chen, Y. Xia and G. Jin, 2013. A rank correlation based detection against distributed reflection DoS attacks. Commun. Lett. IEEE., 17: 173-175.
CrossRef  |  Direct Link  |  

Zhong, S., T.M. Khoshgoftaar and N. Seliya, 2007. Clustering-based network intrusion detection. Int. J. Reliability Qual. Safety Eng., 14: 169-187.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved