Open Access
Subscription Access
Open Access
Subscription Access
Prevention of Zero Day Vulnerability in Network Using Ensemble Fuzzy Association and Cuttle Fish Detection
Subscribe/Renew Journal
The data communication between different parts of the universe is managed by the computer networks and the Enterprise Information System (EIS) which rely on them. The privacy and security are the most important factor to be maintained in any network systems. This paper deals about the detection of intrusion attack in the eclipse database using Ensemble fuzzy association (EFA) and Cuttle Fish Algorithm (CFA. The proposed methodology creates a rule-based ensemble model for network diversity metric modeling for the efficient detection of zeroday attacks and to reduce the time consumption. The simulation result shows that the EFA and CFA having efficient detection rates as compared to the existing systems.
Keywords
Enterprise Information System (EIS), Ensemble Fuzzy Association (EFA), Cuttle Fish Algorithm (CFA).
Subscription
Login to verify subscription
User
Font Size
Information
- Nicolas Falliere, Liam O Murchu and Eric Chien, “W32.Stuxnet Dossier”, Available at: https://scadahacker.com/library/Documents/Cyber_Events/Symantec%20-%20Stuxnet%20Dossier%20v1.4.pdf.
- Bev Littlewood and Lorenzo Strigini, “Redundancy and Diversity in Security”, Proceedings of European Symposium on Research in Computer Security, pp. 423-438, 2004.
- Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong and Jason Hiser, “N-Variant Systems: A Secretless Framework for Security through Diversity”, Proceedings of 15th USENIX Security Symposium, pp. 105-120, 2006.
- Debin Gao, Michael K. Reiter and Dawn Song, “Behavioral Distance Measurement using Hidden Markov Models”, Proceedings of International Workshop on Recent Advances in Intrusion Detection, pp. 19-40, 2006.
- Byung-Gon Chun, Petros Maniatis and Scott Shenker, “Diverse Replication for Single Machine Byzantine-Fault Tolerance”, Proceedings of USENIX Annual Technical Conference, pp. 287-292, 2008.
- M. Garcia, A. Bessani, I. Gashi, N. Neves and R. Obelheiro, “OS Diversity for Intrusion Tolerance: Myth or Reality?”, Proceedings of IEEE/IFIP 41st International Conference on Dependable Systems and Networks, pp. 383-394, 2011.
- Sandeep Bhatkar, Daniel C. DuVarney and R. Sekar, “Address Obfuscation: An Efficient Approach to Combat A Broad Range of Memory Error Exploits”, Proceedings of 12th USENIX Annual Technical Conference, pp. 105-120, 2003.
Abstract Views: 279
PDF Views: 3