ICSES Transactions on Computer Networks and Communications
Vol. 1, No. 2, Nov. 2015
A New Technique by Design an Efficient System for Intrusion Detection | Original Paper
https://doi.org/10.1234/icses.itcnc.2018.4.1.-12 (test)
|
Editors' Choice |
Original Paper |
|
1.6k Visits |
647 Downloads |
a Masjed-Soleiman Branch, Islamic Azad University (I.A.U), Masjed-Soleiman, Iran
Eng. AbdolHamid MomenZadeh
Corresponding Author Affiliation: Masjed-Soleiman Branch, Islamic Azad University (I.A.U), Masjed-Soleiman, Iran Tel: +989166810031 E-mail: momenzadeh.hamid@gmail.com Eng. AbdolHamid MomenZadeh's publications in ICSES
- A Novel Job Scheduler for Computational Grid Using Simulated Annealing Heuristic
ICSES Transactions on Evolutionary and Metaheuristic Algorithms Original Paper | Vol. 1, No. 1 | Pages 6-13 | Nov. 2015 Hamid Saadi, AbdolHamid MomenZadeh, Ehsan PourAliAkbar, et al. - A Novel Optimum Approach for Misuse Detection
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 1-6 | Nov. 2015 AbdolHamid MomenZadeh - A New Technique by Design an Efficient System for Intrusion Detection
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 7-11 | Nov. 2015 AbdolHamid MomenZadeh - Network Lifetime Enhancement by a New Clustering Method in Wireless Sensor Networks
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 12-16 | Nov. 2015 Ehsan PourAliAkbar, AbdolHamid MomenZadeh, Hamid Saadi, et al.
|
This article has been retracted by International Computer Science and Engineering Society (ICSES) because of ethical misconduct, scientific distortion, or administrative error, and cannot be downloaded and used for any purpose based on the violation in ICSES Ethics in Publicationcall_made |
Retraction Note by the Editor-in-Chief
Highlights and Novelties
No Highlights!
Manuscript Abstract
The basic standard of detect of intrusion is based on the assumption that intrusive activities are noticeably different from normal ones and thus are detectable. In past surveys, the capability of fuzzy systems to solve different kinds of problems confirmed. New attacks are emerging every day, detect of intrusion systems play a basic role in identifying possible attacks to the system, and give proper responses. Evolutionary Fuzzy System with the learning capability of Evolutionary Algorithms hybridizes the approximate reasoning method of fuzzy systems. Propose of this paper is to demonstrate the ability of Evolutionary Fuzzy to deal with detect of intrusion classification problem as a new real-world application area. The Evolutionary Fuzzy System would be capable of extracting accurate fuzzy classification in computer network rules to detect normal and intrusive behaviors from network traffic data and applies them. The experimental results were performed with detect of intrusion benchmark dataset which has information on computer networks, and intrusive behaviors during normal. Results of our model have been compared with several famous detect of intrusion systems.
Keywords
Component intrusion detection simulated annealing search fuzzy if-then rules.
Copyright and Licence
© Copyright was transferred to International Computer Science and Engineering Society (ICSES) by all the Authors. This manuscript is published in Open-Access manner based on the copyright licence of Creative Commons Attribution Non Commercial 4.0 International (CC BY-NC 4.0).
Cite this manuscript as
AbdolHamid MomenZadeh, "A New Technique by Design an Efficient System for Intrusion Detection," ICSES Transactions on Computer Networks and Communications, vol. 1, no. 2, pp. 7-11, Nov. 2015. DOI: 10.1234/icses.itcnc.2018.4.1.-12 (test)
For External Scientific Databeses
--BibTex--
@article{al._-12 title="A New Technique by Design an Efficient System for Intrusion Detection", author="AbdolHamid MomenZadeh", journal="ICSES Transactions on Computer Networks and Communications (ITCNC)", volume="1", number="2", pages="7-11", year="2015", month="11", day="01", publisher= "International Computer Science and Engineering Society (ICSES)", doi="10.1234/icses.itcnc.2018.4.1.-12 (test)", url="http://www.i-cses.com/files/download.php?pID=-12"}
--EndNote--
%0 Journal Article %T A New Technique by Design an Efficient System for Intrusion Detection %A AbdolHamid MomenZadeh %J ICSES Transactions on Computer Networks and Communications (ITCNC) %V 1 %N 2 %P 7-11 %D 2015 %I International Computer Science and Engineering Society (ICSES) %U http://www.i-cses.com/files/download.php?pID=-12 %8 2015-11-30 %R 10.1234/icses.itcnc.2018.4.1.-12 (test) %@ 2588-5847
--Dublin--
< name="citation_title" content="A New Technique by Design an Efficient System for Intrusion Detection">
< name="citation_author" content="AbdolHamid MomenZadeh">
< name="citation_publication_date" content="2015-11-30">
< name="citation_journal_title" content="ICSES Transactions on Computer Networks and Communications (ITCNC)">
< name="citation_issn" content="2588-5847">
< name="citation_volume" content="1">
< name="citation_issue" content="2">
< name="citation_firstpage" content="7">
< name="citation_lastpage" content="11">
< name="citation_pdf_url" content="http://www.i-cses.com/files/download.php?pID=-12">
|