Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms

The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has...

Full description

Saved in:
Bibliographic Details
Published in:HNICEM : 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management : 1-3 December 2017 pp. 1 - 6
Main Authors: Villaluna, Jason A., Cruz, Febus Reidj G.
Format: Conference Proceeding
Language:English
Published: IEEE 01.12.2017
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has increased. Utilization of soft-computing based on the behavior of the network may detect new or modified old attacks. An information security system is developed for the recognition the network infrastructure's behavior. This is limited to Normal, DoS, Probe, U2R, and R2L. The packets on the network are processed in MATLAB and analyze using Fuzzy Logic, Artificial Neural Network, and Fuzzy-Neural Network. Different tests are done with different datasets of varied parameters. The best model for each algorithm, which is rendered from the tests, is used for the information security system. The cyber-attacks were identified within a short period: 51.64us for Fuzzy Logic, 1.34us for Artificial Neural Network, and 14.23us for the Fuzzy Neural Network. The detection rate and accuracy of the three algorithms are 94.84%, 98.51%, 98.60% and 89.74%, 96.09%, 96.19% respectively. The Fuzzy Neural Network has the best performance which used the advantage of Fuzzy Logic and Artificial Neural Network.
AbstractList The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has increased. Utilization of soft-computing based on the behavior of the network may detect new or modified old attacks. An information security system is developed for the recognition the network infrastructure's behavior. This is limited to Normal, DoS, Probe, U2R, and R2L. The packets on the network are processed in MATLAB and analyze using Fuzzy Logic, Artificial Neural Network, and Fuzzy-Neural Network. Different tests are done with different datasets of varied parameters. The best model for each algorithm, which is rendered from the tests, is used for the information security system. The cyber-attacks were identified within a short period: 51.64us for Fuzzy Logic, 1.34us for Artificial Neural Network, and 14.23us for the Fuzzy Neural Network. The detection rate and accuracy of the three algorithms are 94.84%, 98.51%, 98.60% and 89.74%, 96.09%, 96.19% respectively. The Fuzzy Neural Network has the best performance which used the advantage of Fuzzy Logic and Artificial Neural Network.
Author Villaluna, Jason A.
Cruz, Febus Reidj G.
Author_xml – sequence: 1
  givenname: Jason A.
  surname: Villaluna
  fullname: Villaluna, Jason A.
  organization: Sch. of Grad. Studies, Mapua Univ., Manila, Philippines
– sequence: 2
  givenname: Febus Reidj G.
  surname: Cruz
  fullname: Cruz, Febus Reidj G.
  organization: Sch. of Electr. Electron. & Comput. Eng., Mapua Univ., Manila, Philippines
BookMark eNotkEFOwzAURI0EErT0BN34Ain-cRs7S1QVWqnABtaV43wnhsSubEcoC-5Oq3Y1Gs3ojTQTcuu8Q0LmwBYArHzavu_Wm7dFzkAsZF6US85uyARWXBashLy4J7MYvxljUBZyJZYP5G_njA-9StY7GlEPwaaRJtSt851vRnpKqfb9cUgYqMP068NPpKkNfmhaqjsVozVWXwDeUD1WGDKVktKn3hCta2j0Jl0hZ6u6xp9m2j4-kjujuoizq07J18vmc73N9h-vu_XzPrMgVinTWFQoFXJTailqUzBYgoZSG4UlN7k0kFcKRM4EN3Wdi1rUEhC4UVJXxvApmV-4FhEPx2B7FcbD9SH-DwAuZEs
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HNICEM.2017.8269430
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1538609126
9781538609125
EndPage 6
ExternalDocumentID 8269430
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-ce6be8ae3f9c87df60141c19cfae93f28f12ba172073fdd27d7d81e13fa8cbff3
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000426116300011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:24:42 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-ce6be8ae3f9c87df60141c19cfae93f28f12ba172073fdd27d7d81e13fa8cbff3
PageCount 6
ParticipantIDs ieee_primary_8269430
PublicationCentury 2000
PublicationDate 2017-Dec.
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationTitle HNICEM : 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management : 1-3 December 2017
PublicationTitleAbbrev HNICEM
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001968574
Score 1.6534362
Snippet The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Artificial neural network
Artificial neural networks
Classification algorithms
cyber-attacks
Fuzzy logic
fuzzy neural network
Information security
Internet
Title Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms
URI https://ieeexplore.ieee.org/document/8269430
WOSCitedRecordID wos000426116300011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKxQALjxbxlgdG0jZP23PVqgxUHUDqVvlxVypBgpoUiYH_jp1YLUgsbHkod9JZzp3t77uPkDsjeJZGAxnEhidBYnOmnXMqCsQADaahxNTwWmyCTad8PhezFrnfcmEAoAafQc9d1mf5ptAbt1XW5452GdsF-h5jrOFq7fZTRMZTlvjGQuFA9CfTh-Ho0aG3WM9_-UtCpc4g46P_-T4m3R0Vj862SeaEtCA_JYc_ugh2yJenFLkQ09Lr0dFqu2dO7VuqvXoDzRvcd0m9Qg_Vrn52gKHGQIFUfypYB7KqHP-eOmT8kpb2d-2NuFv5uiysm5e3skuex6On4STwqgrBypYKVaAhU8AlxCg0ZwYzB_XUodAoQcQYcQwjJW1dYyc_GhMxwwwPIYxRcq0Q4zPSzosczgk1aaSZUsrEDOwyGwW3RgVaB5HAUMEF6bhALt6bxhkLH8PLvx9fkQM3Vg1W5Jq0q_UGbsi-_qhW5fq2Hu1v4Vux1Q
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ImqgXH2B824NHF2j30fZMIBBhwwETbqRPJNHFsIuJB_-77W4Dmnjxto_sTDJNd6bt980HwINiNIlxhweholEQ2Zxp55zAAesYZWLETaxoKTZB0pTOZmxSA49bLozWugSf6Za7LM_y1Upu3FZZmzraZWgX6HtxFGFUsbV2OyosoTGJfGsh1GHtQTrs9sYOv0Va_ttfIiplDukf_8_7CWjuyHhwsk0zp6CmszNw9KOPYAN8eVKRCzLMvSIdLLa75tC-hdLrN8CsQn7n0Gv0QOkqaAcZqgysDJSfQq8DXhSOgQ8dNn4Bc_vD9kbcLX9drKybl7e8CZ77vWl3EHhdhWBpi4UikDoRmnIdGiYpUSZxYE-JmDRcs9BgahAW3FY2dvobpTBRRFGkUWg4lcKY8BzUs1WmLwBUMZZECKFCou1C2zBqjTJjHWBmkNCXoOECOX-vWmfMfQyv_n58Dw4G0_FoPhqmT9fg0I1bhRy5AfVivdG3YF9-FMt8fVeO_DdE9bUc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=HNICEM+%3A+2017+IEEE+9th+International+Conference+on+Humanoid%2C+Nanotechnology%2C+Information+Technology%2C+Communication+and+Control%2C+Environment+and+Management+%3A+1-3+December+2017&rft.atitle=Information+security+technology+for+computer+networks+through+classification+of+cyber-attacks+using+soft+computing+algorithms&rft.au=Villaluna%2C+Jason+A.&rft.au=Cruz%2C+Febus+Reidj+G.&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FHNICEM.2017.8269430&rft.externalDocID=8269430