Abstract
Application of agent technology in Intrusion Detection Systems (IDSs) has been developed. Intrusion Detection (ID) agent technology can bring IDS flexibility and enhanced distributed detection capability. However, the security of the ID agent and methods of collaboration among ID agents are important problems noted by many researchers. In this paper, coordination among the intrusion detection agents by BlackBoard Architecture (BBA), which transcends into the field of distributed artificial intelligence, is introduced. A system using BBA for information sharing can easily be expanded by adding new agents and increasing the number of BlackBoard (BB) levels. Moreover the subdivided BB levels enhance the sensitivity of ID. This paper applies fuzzy logic to reduce the false positives that represent one of the core problems of IDS. ID is a complicated decision-making process, generally involving enormous factors regarding the monitored system. A fuzzy logic evaluation component, which represents a decision agent model of in distributed IDSs, considers various factors based on fuzzy logic when an intrusion behavior is analyzed. The performance obtained from the coordination of an ID agent with fuzzy logic is compared with the corresponding non-fuzzy type ID agent.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Northcutt, S.: Network Intrusion Detection - An Analyst’s Handbook. New Riders Publishing (1999)
Zeigler, B.P., Praehofer, H., Kim, T.G.: Theory of Modeling and Simulation, 2nd edn. Academic Press, London (1999)
Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: IFSA World Congress and 20th NAFIPS International Conference, pp. 1506–1510 (2001)
Bace, R.: Intrusion Detection. Macmillan Technical Publishing, Basingstoke (2000)
Seo, H.S., Cho, T.H.: Simulation Model Design of Security System based on Policy-Based Framework. Simulation Transactions of The Society for Modeling and Simulation International 79(9), 515–527 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seo, H.S., Cho, T.H. (2005). Application of Fuzzy Logic for Distributed Intrusion Detection. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_51
Download citation
DOI: https://doi.org/10.1007/11596981_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)