Title: Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification

Authors: K.P. Rama Prabha; N. Jeyanthi

Addresses: School of Information Technology and Engineering, VIT University, Vellore, India ' School of Information Technology and Engineering, VIT University, Vellore, India

Abstract: Cyber attack detection is an important and challenging area of research in the field of information technology. In such a scenario, intruders introduce new mechanisms by applying polymorphic mechanisms in order to escape from the intrusion detection systems. This leads to loss in data and increase in security vulnerabilities. In the past, many soft computing techniques were used from the field of machine learning for enhancing the efficiency of intrusion detection systems (IDSs) in computer networks. Among them, fuzzy logic played a major role for making effective decisions. In addition, the neural networks are also contributing more in this area for training the datasets to form rules which can be used to develop an effective intrusion detection system. In this paper, we propose a new intrusion detection system by combining neural networks with temporal and type-2 fuzzy logic for performing effective classification of the dataset. In addition, a new feature selection algorithm is also proposed in this paper which uses information gain of attributes with fuzzy logic decision making for selecting the optimal number of features from the dataset. This work has been tested by using NSL-KDD dataset and through the experiments conducted in this work it is proved that the proposed system increases the intrusion detection accuracy and reduces the false positive rate when it is compared with other existing systems.

Keywords: neural networks; type-2 fuzzy logic; intrusion detection system; IDS; NSL-KDD dataset; feature selection; classification.

DOI: 10.1504/IJITST.2018.093367

International Journal of Internet Technology and Secured Transactions, 2018 Vol.8 No.2, pp.167 - 184

Received: 14 Jan 2017
Accepted: 05 Apr 2017

Published online: 25 Jul 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article