Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms
The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has...
Saved in:
| Published in: | HNICEM : 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management : 1-3 December 2017 pp. 1 - 6 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.12.2017
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has increased. Utilization of soft-computing based on the behavior of the network may detect new or modified old attacks. An information security system is developed for the recognition the network infrastructure's behavior. This is limited to Normal, DoS, Probe, U2R, and R2L. The packets on the network are processed in MATLAB and analyze using Fuzzy Logic, Artificial Neural Network, and Fuzzy-Neural Network. Different tests are done with different datasets of varied parameters. The best model for each algorithm, which is rendered from the tests, is used for the information security system. The cyber-attacks were identified within a short period: 51.64us for Fuzzy Logic, 1.34us for Artificial Neural Network, and 14.23us for the Fuzzy Neural Network. The detection rate and accuracy of the three algorithms are 94.84%, 98.51%, 98.60% and 89.74%, 96.09%, 96.19% respectively. The Fuzzy Neural Network has the best performance which used the advantage of Fuzzy Logic and Artificial Neural Network. |
|---|---|
| AbstractList | The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has increased. Utilization of soft-computing based on the behavior of the network may detect new or modified old attacks. An information security system is developed for the recognition the network infrastructure's behavior. This is limited to Normal, DoS, Probe, U2R, and R2L. The packets on the network are processed in MATLAB and analyze using Fuzzy Logic, Artificial Neural Network, and Fuzzy-Neural Network. Different tests are done with different datasets of varied parameters. The best model for each algorithm, which is rendered from the tests, is used for the information security system. The cyber-attacks were identified within a short period: 51.64us for Fuzzy Logic, 1.34us for Artificial Neural Network, and 14.23us for the Fuzzy Neural Network. The detection rate and accuracy of the three algorithms are 94.84%, 98.51%, 98.60% and 89.74%, 96.09%, 96.19% respectively. The Fuzzy Neural Network has the best performance which used the advantage of Fuzzy Logic and Artificial Neural Network. |
| Author | Villaluna, Jason A. Cruz, Febus Reidj G. |
| Author_xml | – sequence: 1 givenname: Jason A. surname: Villaluna fullname: Villaluna, Jason A. organization: Sch. of Grad. Studies, Mapua Univ., Manila, Philippines – sequence: 2 givenname: Febus Reidj G. surname: Cruz fullname: Cruz, Febus Reidj G. organization: Sch. of Electr. Electron. & Comput. Eng., Mapua Univ., Manila, Philippines |
| BookMark | eNotkEFOwzAURI0EErT0BN34Ain-cRs7S1QVWqnABtaV43wnhsSubEcoC-5Oq3Y1Gs3ojTQTcuu8Q0LmwBYArHzavu_Wm7dFzkAsZF6US85uyARWXBashLy4J7MYvxljUBZyJZYP5G_njA-9StY7GlEPwaaRJtSt851vRnpKqfb9cUgYqMP068NPpKkNfmhaqjsVozVWXwDeUD1WGDKVktKn3hCta2j0Jl0hZ6u6xp9m2j4-kjujuoizq07J18vmc73N9h-vu_XzPrMgVinTWFQoFXJTailqUzBYgoZSG4UlN7k0kFcKRM4EN3Wdi1rUEhC4UVJXxvApmV-4FhEPx2B7FcbD9SH-DwAuZEs |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/HNICEM.2017.8269430 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1538609126 9781538609125 |
| EndPage | 6 |
| ExternalDocumentID | 8269430 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-ce6be8ae3f9c87df60141c19cfae93f28f12ba172073fdd27d7d81e13fa8cbff3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000426116300011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:24:42 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-ce6be8ae3f9c87df60141c19cfae93f28f12ba172073fdd27d7d81e13fa8cbff3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8269430 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Dec. |
| PublicationDateYYYYMMDD | 2017-12-01 |
| PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | HNICEM : 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management : 1-3 December 2017 |
| PublicationTitleAbbrev | HNICEM |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001968574 |
| Score | 1.6534362 |
| Snippet | The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Artificial neural network Artificial neural networks Classification algorithms cyber-attacks Fuzzy logic fuzzy neural network Information security Internet |
| Title | Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms |
| URI | https://ieeexplore.ieee.org/document/8269430 |
| WOSCitedRecordID | wos000426116300011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKxQALjxbxlgdG0jZP23PVqgxUHUDqVvlxVypBgpoUiYH_jp1YLUgsbHkod9JZzp3t77uPkDsjeJZGAxnEhidBYnOmnXMqCsQADaahxNTwWmyCTad8PhezFrnfcmEAoAafQc9d1mf5ptAbt1XW5452GdsF-h5jrOFq7fZTRMZTlvjGQuFA9CfTh-Ho0aG3WM9_-UtCpc4g46P_-T4m3R0Vj862SeaEtCA_JYc_ugh2yJenFLkQ09Lr0dFqu2dO7VuqvXoDzRvcd0m9Qg_Vrn52gKHGQIFUfypYB7KqHP-eOmT8kpb2d-2NuFv5uiysm5e3skuex6On4STwqgrBypYKVaAhU8AlxCg0ZwYzB_XUodAoQcQYcQwjJW1dYyc_GhMxwwwPIYxRcq0Q4zPSzosczgk1aaSZUsrEDOwyGwW3RgVaB5HAUMEF6bhALt6bxhkLH8PLvx9fkQM3Vg1W5Jq0q_UGbsi-_qhW5fq2Hu1v4Vux1Q |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ImqgXH2B824NHF2j30fZMIBBhwwETbqRPJNHFsIuJB_-77W4Dmnjxto_sTDJNd6bt980HwINiNIlxhweholEQ2Zxp55zAAesYZWLETaxoKTZB0pTOZmxSA49bLozWugSf6Za7LM_y1Upu3FZZmzraZWgX6HtxFGFUsbV2OyosoTGJfGsh1GHtQTrs9sYOv0Va_ttfIiplDukf_8_7CWjuyHhwsk0zp6CmszNw9KOPYAN8eVKRCzLMvSIdLLa75tC-hdLrN8CsQn7n0Gv0QOkqaAcZqgysDJSfQq8DXhSOgQ8dNn4Bc_vD9kbcLX9drKybl7e8CZ77vWl3EHhdhWBpi4UikDoRmnIdGiYpUSZxYE-JmDRcs9BgahAW3FY2dvobpTBRRFGkUWg4lcKY8BzUs1WmLwBUMZZECKFCou1C2zBqjTJjHWBmkNCXoOECOX-vWmfMfQyv_n58Dw4G0_FoPhqmT9fg0I1bhRy5AfVivdG3YF9-FMt8fVeO_DdE9bUc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=HNICEM+%3A+2017+IEEE+9th+International+Conference+on+Humanoid%2C+Nanotechnology%2C+Information+Technology%2C+Communication+and+Control%2C+Environment+and+Management+%3A+1-3+December+2017&rft.atitle=Information+security+technology+for+computer+networks+through+classification+of+cyber-attacks+using+soft+computing+algorithms&rft.au=Villaluna%2C+Jason+A.&rft.au=Cruz%2C+Febus+Reidj+G.&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FHNICEM.2017.8269430&rft.externalDocID=8269430 |