Javascript must be enabled to continue!
An efficient intelligent intrusion detection system using fuzzy logic based on the Particle Swarm Optimization algorithm: A case study
View through CrossRef
This paper presents an intelligent intrusion detection system using fuzzy logic based on particle swarm optimization algorithm. The main goal of this research is to survey the convergence capability of the particle swarm optimization algorithm using fuzzy logic in intelligent intrusion detection of a designable system. In order to simulate intelligent attacks on a system, KDD99 data are used. Based on the findings, the Particle Swarm Optimization (PSO) algorithm is highly capable of detecting an intelligent attack on a system. In this study, we considered 1800 times attack, in which the PSO algorithm was capable of repelling attacks in 7.24 s and converged. The best convergence occurred at stage 775, and then all attacks were eliminated from the system. Results showed that the stability and convergence of the system improved after each attack. Also, the number of attacks increased to 2500 times to investigate unpredictable intrusions and converge accrued at the attack 771st. Finally, the results obtained by the PSO algorithms were compared to the results obtained by the Genetic Algorithm (GA) and Simulated Annealing (SA) algorithm. The findings indicate that the PSO algorithm is highly capable of detecting intelligent intrusions into a system. It is also suggested to employ this algorithm in cloud computing systems because of its high capability of repelling smart attacks.
Title: An efficient intelligent intrusion detection system using fuzzy logic based on the Particle Swarm Optimization algorithm: A case study
Description:
This paper presents an intelligent intrusion detection system using fuzzy logic based on particle swarm optimization algorithm.
The main goal of this research is to survey the convergence capability of the particle swarm optimization algorithm using fuzzy logic in intelligent intrusion detection of a designable system.
In order to simulate intelligent attacks on a system, KDD99 data are used.
Based on the findings, the Particle Swarm Optimization (PSO) algorithm is highly capable of detecting an intelligent attack on a system.
In this study, we considered 1800 times attack, in which the PSO algorithm was capable of repelling attacks in 7.
24 s and converged.
The best convergence occurred at stage 775, and then all attacks were eliminated from the system.
Results showed that the stability and convergence of the system improved after each attack.
Also, the number of attacks increased to 2500 times to investigate unpredictable intrusions and converge accrued at the attack 771st.
Finally, the results obtained by the PSO algorithms were compared to the results obtained by the Genetic Algorithm (GA) and Simulated Annealing (SA) algorithm.
The findings indicate that the PSO algorithm is highly capable of detecting intelligent intrusions into a system.
It is also suggested to employ this algorithm in cloud computing systems because of its high capability of repelling smart attacks.
Related Results
Hydatid Disease of The Brain Parenchyma: A Systematic Review
Hydatid Disease of The Brain Parenchyma: A Systematic Review
Abstarct
Introduction
Isolated brain hydatid disease (BHD) is an extremely rare form of echinococcosis. A prompt and timely diagnosis is a crucial step in disease management. This ...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Abstract. Fuzzy Inference System requires several stages to get the output, 1) formation of fuzzy sets, 2) formation of rules, 3) application of implication functions, 4) compositi...
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Here in this paper, we provide characterizations of fuzzy quasi-ideal in terms of level and strong level subsets. Along with it, we provide expression for the generated fuzzy quasi...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
Quantum Behaved Particle Swarm Optimization Algorithm Based on Artificial Fish Swarm
Quantum Behaved Particle Swarm Optimization Algorithm Based on Artificial Fish Swarm
Quantum behaved particle swarm algorithm is a new intelligent optimization algorithm; the algorithm has less parameters and is easily implemented. In view of the existing quantum b...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...

