Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Prevention of Zero Day Vulnerability in Network Using Ensemble Fuzzy Association and Cuttle Fish Detection


Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
2 Department of Computer Science and Engineering, Francis Xavier Engineering College, India
     

   Subscribe/Renew Journal


The data communication between different parts of the universe is managed by the computer networks and the Enterprise Information System (EIS) which rely on them. The privacy and security are the most important factor to be maintained in any network systems. This paper deals about the detection of intrusion attack in the eclipse database using Ensemble fuzzy association (EFA) and Cuttle Fish Algorithm (CFA. The proposed methodology creates a rule-based ensemble model for network diversity metric modeling for the efficient detection of zeroday attacks and to reduce the time consumption. The simulation result shows that the EFA and CFA having efficient detection rates as compared to the existing systems.

Keywords

Enterprise Information System (EIS), Ensemble Fuzzy Association (EFA), Cuttle Fish Algorithm (CFA).
Subscription Login to verify subscription
User
Notifications
Font Size

  • Nicolas Falliere, Liam O Murchu and Eric Chien, “W32.Stuxnet Dossier”, Available at: https://scadahacker.com/library/Documents/Cyber_Events/Symantec%20-%20Stuxnet%20Dossier%20v1.4.pdf.
  • Bev Littlewood and Lorenzo Strigini, “Redundancy and Diversity in Security”, Proceedings of European Symposium on Research in Computer Security, pp. 423-438, 2004.
  • Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong and Jason Hiser, “N-Variant Systems: A Secretless Framework for Security through Diversity”, Proceedings of 15th USENIX Security Symposium, pp. 105-120, 2006.
  • Debin Gao, Michael K. Reiter and Dawn Song, “Behavioral Distance Measurement using Hidden Markov Models”, Proceedings of International Workshop on Recent Advances in Intrusion Detection, pp. 19-40, 2006.
  • Byung-Gon Chun, Petros Maniatis and Scott Shenker, “Diverse Replication for Single Machine Byzantine-Fault Tolerance”, Proceedings of USENIX Annual Technical Conference, pp. 287-292, 2008.
  • M. Garcia, A. Bessani, I. Gashi, N. Neves and R. Obelheiro, “OS Diversity for Intrusion Tolerance: Myth or Reality?”, Proceedings of IEEE/IFIP 41st International Conference on Dependable Systems and Networks, pp. 383-394, 2011.
  • Sandeep Bhatkar, Daniel C. DuVarney and R. Sekar, “Address Obfuscation: An Efficient Approach to Combat A Broad Range of Memory Error Exploits”, Proceedings of 12th USENIX Annual Technical Conference, pp. 105-120, 2003.

Abstract Views: 280

PDF Views: 3




  • Prevention of Zero Day Vulnerability in Network Using Ensemble Fuzzy Association and Cuttle Fish Detection

Abstract Views: 280  |  PDF Views: 3

Authors

M. Masthan
Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
R. Ravi
Department of Computer Science and Engineering, Francis Xavier Engineering College, India

Abstract


The data communication between different parts of the universe is managed by the computer networks and the Enterprise Information System (EIS) which rely on them. The privacy and security are the most important factor to be maintained in any network systems. This paper deals about the detection of intrusion attack in the eclipse database using Ensemble fuzzy association (EFA) and Cuttle Fish Algorithm (CFA. The proposed methodology creates a rule-based ensemble model for network diversity metric modeling for the efficient detection of zeroday attacks and to reduce the time consumption. The simulation result shows that the EFA and CFA having efficient detection rates as compared to the existing systems.

Keywords


Enterprise Information System (EIS), Ensemble Fuzzy Association (EFA), Cuttle Fish Algorithm (CFA).

References