Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems
Main Article Content
Abstract
Network security has become increasingly critical in recent years. Among the various aspects of network security and considering several approaches to network security, intrusion detection systems (IDSs) have gained considerable attention. The prominence of this factor, among other factors of network security, is due to its ability to address the complex and uncertain nature of security breaches. Whenever data flow over the network, precise categorization of normal and malicious data is necessary. Past IDS systems lack precise categorization. Thus, the present study focuses on the use of the adaptive neuro-fuzzy inference system (ANFIS) as a classifier to categorize network instances into malicious types and normal behavior. Using the KDD99 dataset, the performance of ANFIS is evaluated and compared with that of traditional machine learning models such as decision trees and multilayer perceptrons. Through experimentation with different membership functions, such as Gaussian, triangular, bell-shaped, and sigmoidal functions, Gaussian functions are identified as optimal for this specific task. The results underscore the effectiveness of ANFIS, leveraging the strengths of both artificial neural networks (ANNs) and fuzzy reasoning systems. ANFIS demonstrates superior capabilities in understanding nonlinear interaction patterns, adapting to evolving threats, and facilitating rapid learning in intrusion detection applications.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
F. Ahmadi, Sonia, G. Gupta, S. R. Zahra, P. Baglat, and P. Thakur, “Multi-factor biometric authentication approach for fog computing to ensure security perspective,” In Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development, INDIACom 2021, no. June, pp. 172–176, 2021.
P. Tahiri, S. Sonia, P. Jain, G. Gupta, W. Salehi, and S. Tajjour, “An Estimation of Machine Learning Approaches for Intrusion Detection System,” In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), IEEE, Mar. 2021, pp. 343–348, 2021.
F. Akram, D. Liu, P. Zhao, N. Kryvinska, S. Abbas, and M. Rizwan, “Trustworthy Intrusion Detection in E-Healthcare Systems,” Front Public Health, vol. 9, p. 788347, 2021.
A. Alsharef, K. Aggarwal, Sonia, M. Kumar, and A. Mishra, “Review of ML and AutoML solutions to forecast time-series data,” Archives of Computational Methods in Engineering, vol. 29, no. 7, pp.5297-5311, 2022.
B. A. Bensaber, C. G. P. Diaz, and Y. Lahrouni, “Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET,” Journal of Computational Science, vol.47, pp.101234, 2020.
M. Bhakuni, K. Kumar, Sonia, C. Iwendi, and A. Singh, “Evolution and evaluation: Sarcasm analysis for twitter data using sentiment analysis,” Journal of Sensors, vol. 2022, no. 1, pp.6287559, 2022.
I. Bala, I. A. Pindoo, M. M. Mijwil, M. Abotaleb, and W. Yundong, “Ensuring Security and Privacy in Healthcare Systems: A Review Exploring Challenges, Solutions, Future Trends, and the Practical Applications of Artificial Intelligence,” Jordan Medical Journal, vol.58, no.2, pp.250-270, 2024.
A. Bashab, A.O. Ibrahim, I.A. Tarigo Hashem, K. Aggarwal, F. Mukhlif, F.A. Ghaleb, and A. Abdelmaboud, Optimization Techniques in University Timetabling Problem: Constraints, Methodologies, Benchmarks, and Open Issues. Computers, Materials & Continua, vol. 74, no. 3, 2023
S. Gamage and J. Samarabandu, “Deep learning methods in network intrusion detection: A survey and an objective comparison,” Journal of Network and Computer Applications, vol. 169, p. 102767, 2020.
Z. Ahmad, A. S. Khan, C. W. Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 1–29, 2021.
H. I. H. Alsaadi, R. M. ALmuttari, O. N. Ucan, and O. Bayat, “An adapting soft computing model for intrusion detection system,” Computational Intelligence, vol. 38, no. 3, pp. 855–875, 2022.
D. Karaboga and E. Kaya, “Adaptive network based fuzzy inference system (ANFIS) training approaches: a comprehensive survey,” Artificial Intelligence Review, vol.52, pp. 2263–2293, 2018
Y. Zhang, W. Lee, and Y. A. Huang, “Intrusion detection techniques for mobile wireless networks,” Wireless Networks, vol. 9, no. 5, pp. 545–556, 2003
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013
N. S. M. Hassan, “Using Of Neuro-Fuzzy Classifier for Intrusion Detection Systems,” vol. 5, no. 2001963. C4I JOURNAL, pp. 46–61, Jan. 01, 2021. Accessed: Aug. 14, 2023. [Online]. Available: https://sid.ir/paper/954986/en
A. N. Toosi, M. Kahani, and R. Monsefi, “Network intrusion detection based on Neuro-Fuzzy classification,” In 2006 International Conference on Computing and Informatics, ICOCI ’06, 2006.
A. Midzic, Z. Avdagic, and S. Omanovic, “Intrusion detection system modeling based on neural networks and fuzzy logic,” In INES 2016 - 20th Jubilee IEEE International Conference on Intelligent Engineering Systems, Proceedings, pp. 189–194, 2016.
S. Manimurugan, A. q. Majdi, M. Mohmmed, C. Narmatha, and R. Varatharajan, “Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system,” Microprocess Microsyst, vol. 79, p. 103261, 2020
S. Rahman, M. Ahmed, and M. S. Kaiser, “ANFIS based cyber physical attack detection system,” 2016 5th International Conference on Informatics, Electronics and Vision, ICIEV 2016, pp. 944–948,2016.
“KDD Cup 1999 Data.” http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed Jan. 04, 2023).
D.D.Solomon, Sonia, K. Kumar, K. Kanwar, S. Iyer, and M. Kumar, “Extensive review on the role of machine learning for multifactorial genetic disorders prediction,” Archives of Computational Methods in Engineering, vol. 31, no. 2, pp.623-640, 2024.
R. Mehta, K. Aggarwal, D. Koundal, A. Alhudhaif, and K. Polat, “Markov features based DTCWS algorithm for online image forgery detection using ensemble classifier in the pandemic,” Expert Systems with Applications, vol.185, p.115630, 2021.
D. Zaman and M. Mazinani, “Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks”, SHIFRA, vol. 2023, pp. 86–94, Aug. 2023, doi: 10.70470/SHIFRA/2023/010.
J. S. R. Jang, “ANFIS: Adaptive-Network-Based Fuzzy Inference System,” IEEE Transactions on Systems, vol. 23, no. 3, pp.665–685, 1993.
K. Aggarwal, M.S. Bhamrah, and H.S. Ryait, The identification of liver cirrhosis with modified LBP grayscaling and Otsu binarization. SpringerPlus, vol. 5, pp. 1-15, 2016.
“MATLAB Documentation.” https://www.mathworks.com/help/matlab/ (accessed Aug. 14, 2023).
S. Tajjour, S. Garg, S. S. Chandel, and D. Sharma, “A novel hybrid artificial neural network technique for the early skin cancer diagnosis using color space conversions of original images,” International Journal of Imaging Systems and Technology, vol. 33, no. 1, pp.276-286, 2023
G. Ali, M. M. Mijwil, B. A. Buruga, and M. Abotaleb, “A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech,” Iraqi Journal for Computer Science and Mathematics, vol.5, no.3, pp.45-91, 2024.
A. Desai and M. Desai, “A Review of the State of Cybersecurity in the Healthcare Industry and Propose Security Controls,” Mesopotamian Journal of Artificial Intelligence in Healthcare, vol.2023, pp.82–84, 2023
M. M. Mijwil, M. Gök, R. Doshi, K. K. Hiran, and I. Kösesoy, “Utilizing Artificial Intelligence Techniques to Improve the Performance of Wireless Nodes,” In Applications of Artificial Intelligence in Wireless Communication Systems,, pp.150-162, June 2023.
A. Alsharef, Sonia, M. Arora, and K. Aggarwal, “Predicting time-series data using linear and deep learning models—an experimental study,” In Data, Engineering and Applications: Select Proceedings of IDEA 2021 (pp. 505-516). Singapore: Springer Nature Singapore
A. I. Gide and A. A. Mu’azu, “A Real-Time Intrusion Detection System for DoS/DDoS Attack Classification in IoT Networks Using KNN-Neural Network Hybrid Technique ”, BJIoT, vol. 2024, pp. 60–69, Jul. 2024.
A.M. Mahmood and I. Avcı, “Cybersecurity Defence Mechanism Against DDoS Attack with Explainability,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp.278-90, 2024.
D.S. Ahmed, A.A. Abdulhameed and M.T. Gaata, “A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN),” Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp.86-135, 2024.
G. Amirthayogam, N. Kumaran, S. Gopalakrishnan, K. Brito, S. RaviChand, and S. B. Choubey, “Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities”, BJN, vol. 2024, pp. 88–97, Jul. 2024.