Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality

by   Mohammad Almseidin, et al.

It is difficult to implement an efficient detection approach for Intrusion Detection Systems (IDS) and many factors contribute to this challenge. One such challenge concerns establishing adequate boundaries and finding a proper data source. Typical IDS detection approaches deal with raw traffics. These traffics need to be studied in depth and thoroughly investigated in order to extract the required knowledge base. Another challenge involves implementing the binary decision. This is because there are no reasonable limits between normal and attack traffics patterns. In this paper, we introduce a novel idea capable of supporting the proper data source while avoiding the issues associated with the binary decision. This paper aims to introduce a detection approach for defining abnormality by using the Fuzzy Rule Interpolation (FRI) with Simple Network Management Protocol (SNMP) Management Information Base (MIB) parameters. The strength of the proposed detection approach is based on adapting the SNMP-MIB parameters with the FRI. This proposed method eliminates the raw traffic processing component which is time consuming and requires extensive computational measures. It also eliminates the need for a complete fuzzy rule based intrusion definition. The proposed approach was tested and evaluated using an open source SNMP-MIB dataset and obtained a 93 Additionally, when compared to other literature in which the same test-bed environment was employed along with the same number of parameters, the proposed detection approach outperformed the support vector machine and neural network. Therefore, combining the SNMP-MIB parameters with the FRI based reasoning could be beneficial for detecting intrusions, even in the case if the fuzzy rule based intrusion definition is incomplete (not fully defined).



There are no comments yet.


page 4


Intrusion Detection Mechanism Using Fuzzy Rule Interpolation

Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated...

Fuzzy Rule Interpolation Toolbox for the GNU Open-Source OCTAVE

In most fuzzy control applications (applying classical fuzzy reasoning),...

Anomaly-based Intrusion Detection System Using Fuzzy Logic

Recently, the Distributed Denial of Service (DDOS) attacks has been used...

Uncertainty Management for Fuzzy Decision Support Systems

A new approach for uncertainty management for fuzzy, rule based decision...

A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring

An enhanced approach for network monitoring is to create a network monit...

PALM: An Incremental Construction of Hyperplanes for Data Stream Regression

Data stream has been the underlying challenge in the age of big data bec...

Collecting MIB Data from Network Managed by SNMP using Multi Mobile Agents

Network anomalies are destructive to networks. Intrusion detection syste...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.