Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Hybrid Intrusion Detection System using FCRM Mechanism

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 105 - Number 9
Year of Publication: 2014
P. Ananthi
P. Balasubramanie

P.ananthi and P.balasubramanie. Article: Hybrid Intrusion Detection System using FCRM Mechanism. International Journal of Computer Applications 105(9):25-29, November 2014. Full text available. BibTeX

	author = {P.ananthi and P.balasubramanie},
	title = {Article: Hybrid Intrusion Detection System using FCRM Mechanism},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {105},
	number = {9},
	pages = {25-29},
	month = {November},
	note = {Full text available}


The necessity of efficient intrusion detection system increased recent research to be focused on hybrid techniques for better results. In recent research plenty of intrusion detection systems have been proposed with various data mining techniques, machine learning mechanisms and fuzzy logic. Existing intrusion detection systems suffered from higher false positive rate and negative rate. This paper proposes the integrated approach such as clustering with Fuzzy neural network for efficient detection rate. In this proposed approach, Fuzzy C-Regression technique is used to construct different training subsets. Then, FNN model is used to take decision making. This proposed approach significantly reduces the false positive and negative rate.


  • S. -X. Wu and W. Banzhaf, 2010. The Use of Computational Intelligence in Intrusion Detection Systems: A Review. Elsevier Applied Soft Computing, vol. 10(1), pp. 1–35.
  • H. T. Elshoush and I. M. Osman, 2000. Reducing False Positives through Fuzzy Alert Correlation in Collaborative Intelligent Intrusion Detection Systems — A Review. IEEE Int'l. Conf. Fuzzy Systems, pp. 1–8.
  • Patcha, A. , & Park, J. M. 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448–3470.
  • Manikopoulos, C. , & Papavassiliou, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine, 40(10), 76–82.
  • Ryan, J. , Lin, M. , & Miikkulainen, R. 1998. Intrusion detection with neural networks. Advances in neural information processing systems (Vol. 10). Cambridge, MA: Springer.
  • P. Spathoulas and S. K. Katsikas, 2009. Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection. Proc. 16th Int'l. Conf. Systems, Signals and Image Processing.
  • Kosko, Bart, 1992. Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence. Englewood Cliffs, NJ: Prentice Hall. ISBN 0-13-611435-0.
  • Lin, W. J. Hwang, and R. J. Wai, 1999. A supervisory fuzzy neural network control system for tracking periodic inputs. IEEE Trans. Fuzzy Systems, Volume 7, No. 1, pp. 41-52.
  • Y. C. Chen and C. C. Teng, 1995. A model reference control structure using a fuzzy neural network. Fuzzy Sets and Systems, Volume 73, pp. 291-312.
  • Bezdek, J. 1974. Fuzzy mathematics in pattern classification. Ph. D. thesis. Ithaca, NY: Cornell University.
  • Beghdad, R. 2008. Critical study of neural networks in detecting intrusions. Computers and Security, 27(5-6), 168–175.
  • Axelsson, S. 2003. The base-rate fallacy and the difficulty of intrusion detection. ACM Transaction on Information and System Security, 3, 186–205.
  • Hathaway, R. J. , Bezdek, J. C. , 1993. Switching regression models and fuzzy clustering. IEEE Trans. Fuzzy Syst. 1 (3), 195–204.
  • Moez Solutani, Abdelkadar Chaary, Faycal Benhimda, 2012. A Novel Fuzzy C-regression Model using a new error measure and particle swarm optimization. International Journal of applied Mathematics and computer science, 22(3), 617-628.
  • Jiang J, Zhang C, Kame M. 2003. RBF-based real-time hierarchical intrusion detection systems. In Pro-ceedings of the International Joint Conference on Neural Networks (IJCNN'03), vol. 2, pp. 1512–1516.
  • M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani. 2009. A Detailed Analysis of the KDD CUP 99 Data Set. Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
  • Yang Li, Li Guo, 2007. An active learning based TCM-KNN algorithm for supervised network intrusion detection, Computers & Security 26 , 459–467
  • Wenying Feng, Qinglei Zhang, Gongzhu Hu, Jimmy Xiangji Huang, Mining network data for intrusion detection through combiningSVMs with ant colony networks,Future Generation Computer Systems 37,127–140
  • Dr. Saurabh Mukherjee,, Neelam Sharma, 2014. Intrusion Detection using Naive Bayes Classifier with Feature Reduction Procedia Technology 4, 119 – 128, Elsevier
  • Norbik Bashah, Idris Bharanidharan Shanmugam, and Abdul Manan Ahmed,2005. Hybrid Intelligent Intrusion Detection System. World Academy of Science, Engineering and Technology.
  • Gan Xu-sheng, Duanmu Jing-shun, Wang Jia-fu, Cong Wei, 2013. Anomaly intrusion detection based on PLS feature extraction and core vector machine, Knowledge-Based Systems 40, 1–6, Elsevier.
  • Hsu-Kun Wu, Jer-Guang Hsieh, Yih-Lon Lin, Jyh-Horng Jeng, 2010. On maximum likelihood fuzzy neural networks, Fuzzy Sets and Systems 161, 2795 – 2807, Science Direct.
  • Michel Menard, 2001. Fuzzy clustering and switching regression models using ambiguity, and distance rejects, Fuzzy Sets and Systems 122, 363–399, Elsevier
  • I. B. Türk?en, 2011. A review of developments in fuzzy system models: Fuzzy rule bases to fuzzy functions Scientia Iranica D 18 (3), 522–527.
  • Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, and Ajith Abraham, 2010. Principle Components Analysis and Support Vector Machine based Intrusion Detection System 978-1-4244-8136, IEEE.
  • Chaoshun Li, Jianzhong Zhou , Xiuqiao Xiang, Qingqing Li, Xueli An, 2009. T–S fuzzy model identification based on a novel fuzzy c-regression model clustering algorithm, Engineering Applications of Artificial Intelligence, 646–653.