Full-Text PDF
DOI:10.19101/IJACR.2017.730022
|
Paper Title |
: |
Fuzzy zero day exploits detector system |
Author Name |
: |
Adnan Shaout and Cameron Smyth |
Abstract |
: |
Intrusion detection systems today are relatively capable of detecting network intrusions by attackers. Unfortunately, these systems operate on a network level and not on a system level. Meanwhile, antivirus software is typically capable of detecting known viruses but cannot easily stop zero day exploits. The paper will propose a fuzzy inference system to detect exploitation of a system using system metrics such as CPU, memory usage and network connections. This system is implemented using the MATLAB fuzzy logic toolbox. The design was tested and provided reasonable results. |
Keywords |
: |
Intrusion detection system, Fuzzy exploit monitor, Fuzzy inference system, Computer security, Zero day exploits. |
Cite this article |
: |
Adnan Shaout and Cameron Smyth , " Fuzzy zero day exploits detector system " ,
International Journal of Advanced Computer Research (IJACR), Volume-7, Issue-31, July-2017 ,pp.154-163.DOI:10.19101/IJACR.2017.730022 |
References |
: |
[1]Chen WW. Statistical methods in computer security. CRC Press; 2004.
|
[Google Scholar] |
[2]Jesdanun A. School prank starts 25 years of security woes. http://www.nbcnews.com/id/20534084/#.V5bI8GXZpg1. Accessed 4 April 2016.
|
[3]Anderson JP. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania; 1980.
|
[Google Scholar] |
[4]Denning DE. An intrusion-detection model. IEEE Transactions on Software Engineering. 1987; SE-13(2):222-32.
|
[Crossref] |
[Google Scholar] |
[5]Vaccaro HS, Liepins GE. Detection of anomalous computer session activity. In IEEE symposium on security and privacy, proceedings 1989 (pp. 280-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[6]Abadeh MS, Habibi J, Lucas C. Intrusion detection using a fuzzy genetics-based learning algorithm. Journal of Network and Computer Applications. 2007; 30(1):414-28.
|
[Crossref] |
[Google Scholar] |
[7]Wang G, Hao J, Ma J, Huang L. A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Systems with Applications. 2010; 37(9):6225-32.
|
[Crossref] |
[Google Scholar] |
[8]Mkuzangwe NN, Nelwamondo FV. A fuzzy logic based network intrusion detection system for predicting the TCP SYN flooding attack. In Asian conference on intelligent information and database systems 2017 (pp. 14-22). Springer, Cham.
|
[Crossref] |
[Google Scholar] |
[9]Shanmugavadivu R, Nagarajan N. Network intrusion detection system using fuzzy logic. Indian Journal of Computer Science and Engineering. 2011; 2(1):101-11.
|
[Google Scholar] |
[10]Kudłacik P, Porwik P, Wesołowski T. Fuzzy approach for intrusion detection based on users commands. Soft Computing. 2016; 20(7):2705-19.
|
[Crossref] |
[Google Scholar] |
[11]Azad C, Jha VK. Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsystem Technologies. 2017; 23(4):907-18.
|
[Crossref] |
[Google Scholar] |
[12]Ramakrishnan S, Devaraju S. Attack’s feature selection-based network intrusion detection system using fuzzy control language. International Journal of Fuzzy Systems. 2017; 19(2):316-28.
|
[Crossref] |
[Google Scholar] |
[13]http://www.unixtop.org. Accessed 4 April 2016.
|
|