Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/21458
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNAPOLES RUIZ, Gonzalo-
dc.contributor.authorGrau, Isel-
dc.contributor.authorFalcon, Rafael-
dc.contributor.authorBello, Rafael-
dc.contributor.authorVANHOOF, Koen-
dc.date.accessioned2016-06-08T08:35:47Z-
dc.date.available2016-06-08T08:35:47Z-
dc.date.issued2016-
dc.identifier.citationAbielmona, Rami; Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein A. (Ed.). Recent Advances in Computational Intelligence in Defence and Security, p. 169-191-
dc.identifier.isbn9783319264486-
dc.identifier.issn1860-949X-
dc.identifier.urihttp://hdl.handle.net/1942/21458-
dc.description.abstractSecurity in computer networks is an active research field since traditional approaches (e.g., access control, encryption, firewalls, etc.) are unable to completely protect networks from attacks and malwares. That is why Intrusion Detection Systems (IDS) have become an essential component of security infrastructure to detect these threats before they inflict widespread damage. Concisely, network intrusion detection is essentially a pattern recognition problem in which network traffic patterns are classified as either normal or abnormal. Several Computational Intelligence (CI) methods have been proposed to solve this challenging problem, including fuzzy sets, swarm intelligence, artificial neural networks and evolutionary computation. Despite the relative success of such methods, the complexity of the classification task associated with intrusion detection demands more effective models. On the other hand, there are scenarios where identifying abnormal patterns could be a challenge as the collected data is still permeated with uncertainty. In this chapter, we tackle the network intrusion detection problem from a classification angle by using a recently proposed granular model named Rough Cognitive Networks (RCN). An RCN is a fuzzy cognitive map that leans upon rough set theory to define its topological constructs. An optimization-based learning mechanism for RCNs is also introduced. The empirical evidence indicates that the RCN is a suitable approach for detecting abnormal traffic patterns in computer networks.-
dc.language.isoen-
dc.publisherSpringer International Publishing-
dc.relation.ispartofseriesStudies in Computational Intelligence-
dc.subject.otherintrusion detection system; computational intelligence; granular computing; rough set theory; fuzzy cognitive maps; rough cognitive networks; harmony search-
dc.titleA Granular Intrusion Detection System using Rough Cognitive Networks-
dc.typeBook Section-
local.bibliographicCitation.authorsAbielmona, Rami-
local.bibliographicCitation.authorsFalcon, Rafael-
local.bibliographicCitation.authorsZincir-Heywood, Nur-
local.bibliographicCitation.authorsAbbass, Hussein A.-
dc.identifier.epage191-
dc.identifier.spage169-
local.bibliographicCitation.jcatB2-
local.type.refereedRefereed-
local.type.specifiedBook Section-
local.relation.ispartofseriesnr621-
local.identifier.vabbc:vabb:414952-
dc.identifier.doi10.1007/978-3-319-26450-9_7-
dc.identifier.isi000369153300008-
local.bibliographicCitation.btitleRecent Advances in Computational Intelligence in Defence and Security-
item.fulltextWith Fulltext-
item.accessRightsOpen Access-
item.fullcitationNAPOLES RUIZ, Gonzalo; Grau, Isel; Falcon, Rafael; Bello, Rafael & VANHOOF, Koen (2016) A Granular Intrusion Detection System using Rough Cognitive Networks. In: Abielmona, Rami; Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein A. (Ed.). Recent Advances in Computational Intelligence in Defence and Security, p. 169-191.-
item.validationvabb 2019-
item.contributorNAPOLES RUIZ, Gonzalo-
item.contributorGrau, Isel-
item.contributorFalcon, Rafael-
item.contributorBello, Rafael-
item.contributorVANHOOF, Koen-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
329996_1_En_7_Chapter_Author.pdfPeer-reviewed author version560.32 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.