Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/21458
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | NAPOLES RUIZ, Gonzalo | - |
dc.contributor.author | Grau, Isel | - |
dc.contributor.author | Falcon, Rafael | - |
dc.contributor.author | Bello, Rafael | - |
dc.contributor.author | VANHOOF, Koen | - |
dc.date.accessioned | 2016-06-08T08:35:47Z | - |
dc.date.available | 2016-06-08T08:35:47Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Abielmona, Rami; Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein A. (Ed.). Recent Advances in Computational Intelligence in Defence and Security, p. 169-191 | - |
dc.identifier.isbn | 9783319264486 | - |
dc.identifier.issn | 1860-949X | - |
dc.identifier.uri | http://hdl.handle.net/1942/21458 | - |
dc.description.abstract | Security in computer networks is an active research field since traditional approaches (e.g., access control, encryption, firewalls, etc.) are unable to completely protect networks from attacks and malwares. That is why Intrusion Detection Systems (IDS) have become an essential component of security infrastructure to detect these threats before they inflict widespread damage. Concisely, network intrusion detection is essentially a pattern recognition problem in which network traffic patterns are classified as either normal or abnormal. Several Computational Intelligence (CI) methods have been proposed to solve this challenging problem, including fuzzy sets, swarm intelligence, artificial neural networks and evolutionary computation. Despite the relative success of such methods, the complexity of the classification task associated with intrusion detection demands more effective models. On the other hand, there are scenarios where identifying abnormal patterns could be a challenge as the collected data is still permeated with uncertainty. In this chapter, we tackle the network intrusion detection problem from a classification angle by using a recently proposed granular model named Rough Cognitive Networks (RCN). An RCN is a fuzzy cognitive map that leans upon rough set theory to define its topological constructs. An optimization-based learning mechanism for RCNs is also introduced. The empirical evidence indicates that the RCN is a suitable approach for detecting abnormal traffic patterns in computer networks. | - |
dc.language.iso | en | - |
dc.publisher | Springer International Publishing | - |
dc.relation.ispartofseries | Studies in Computational Intelligence | - |
dc.subject.other | intrusion detection system; computational intelligence; granular computing; rough set theory; fuzzy cognitive maps; rough cognitive networks; harmony search | - |
dc.title | A Granular Intrusion Detection System using Rough Cognitive Networks | - |
dc.type | Book Section | - |
local.bibliographicCitation.authors | Abielmona, Rami | - |
local.bibliographicCitation.authors | Falcon, Rafael | - |
local.bibliographicCitation.authors | Zincir-Heywood, Nur | - |
local.bibliographicCitation.authors | Abbass, Hussein A. | - |
dc.identifier.epage | 191 | - |
dc.identifier.spage | 169 | - |
local.bibliographicCitation.jcat | B2 | - |
local.type.refereed | Refereed | - |
local.type.specified | Book Section | - |
local.relation.ispartofseriesnr | 621 | - |
local.identifier.vabb | c:vabb:414952 | - |
dc.identifier.doi | 10.1007/978-3-319-26450-9_7 | - |
dc.identifier.isi | 000369153300008 | - |
local.bibliographicCitation.btitle | Recent Advances in Computational Intelligence in Defence and Security | - |
item.fulltext | With Fulltext | - |
item.accessRights | Open Access | - |
item.fullcitation | NAPOLES RUIZ, Gonzalo; Grau, Isel; Falcon, Rafael; Bello, Rafael & VANHOOF, Koen (2016) A Granular Intrusion Detection System using Rough Cognitive Networks. In: Abielmona, Rami; Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein A. (Ed.). Recent Advances in Computational Intelligence in Defence and Security, p. 169-191. | - |
item.validation | vabb 2019 | - |
item.contributor | NAPOLES RUIZ, Gonzalo | - |
item.contributor | Grau, Isel | - |
item.contributor | Falcon, Rafael | - |
item.contributor | Bello, Rafael | - |
item.contributor | VANHOOF, Koen | - |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
329996_1_En_7_Chapter_Author.pdf | Peer-reviewed author version | 560.32 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.