Skip to main content

Application of Fuzzy Logic in Computer Security and Forensics

  • Chapter
  • First Online:
Computational Intelligence for Privacy and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 394))

Abstract

Due to the growing reliance that corporations and government agencies place on their computer networks, the significance of defending these systems from attack cannot be underestimated. A single malicious encroachment into a computer network can cause a great deal of damage to an organisation. Computer Security concerns the protection of information and property from misuse by unauthorized people. Computer forensics provides methods for the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the reconstruction of criminal activities or policy violation. Fuzzy logic can properly be used to help deal with issues associated with computer security and computer forensics. This chapter deals with the use of fuzzy logic in computer security and forensics, providing a general overview of some of its applications, recent algorithms, abilities, advantages and drawbacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zadeh, L.A.: Outline of a new approach to the analysis of complex system and decision processes. IEEE Transactions on Systems Man and Cybernetics 3, 28–44 (1973)

    Article  MATH  MathSciNet  Google Scholar 

  2. Zadeh, L.A.: Fuzzy sets. Information and Control 8, 338–353 (1965)

    Article  MATH  MathSciNet  Google Scholar 

  3. Negnevitsky, M.: Artificial Intelligence: A guide to intelligent systems. Pearson Education Limited, Essex (2005)

    Google Scholar 

  4. Chen, G., Pham, T.: Introduction to fuzzy sets, fuzzy logic, and fuzzy control systems. CRC Press, Washington (2001)

    Google Scholar 

  5. Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and Applications. Prentice Hall PTR, New Jersey (1995)

    MATH  Google Scholar 

  6. Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part I. Information Sciences 8, 199–249 (1975)

    Article  MathSciNet  Google Scholar 

  7. Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part II. Information Sciences 8, 301–357 (1975)

    Article  MathSciNet  Google Scholar 

  8. Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part III. Information Sciences 9, 43–80 (1975)

    Article  MathSciNet  Google Scholar 

  9. Herrera, F., Alonso, S., Chiclana, F., Herrera-Viedma, E.: Computing with Words in Decision Making: Foundations. Trends and Prospects Fuzzy Optimization and Decision Making 8, 337–364 (2009)

    Article  MathSciNet  Google Scholar 

  10. Dubois, D., Ostasiewicz, W., Prade, H.: Fuzzy sets: history and basic notions. In: Dubois, D., Prade, H. (eds.) Fundamentals of Fuzzy Sets. Kluwer Academic Publishers (2000)

    Google Scholar 

  11. Mendel, J.M.: Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions. Prentice Hall, Upper Saddle River (2001)

    MATH  Google Scholar 

  12. Belman, R., Giertz, M.: On the analytic formalism of the theory of fuzzy sets. Information Science 5, 149–156 (1973)

    Article  Google Scholar 

  13. Berenji, H.R.: Fuzzy logic controllers. In: Yager, R.R., Zadeh, L.A. (eds.) An Introduction to Fuzzy Logic Applications in Intelligent Systems. Kluwer Academic Publishers (1992)

    Google Scholar 

  14. Heydeman, J., Reijntjes, R., Babuska, R., Kaymak, U., Van Nauta Lemke, H.: Fuzzy Logic Based Security Assessment of Power Networks. Intelligent Systems Applications to Power Systems 2(9), 405–409 (1996)

    Google Scholar 

  15. Gomez, J., Dasgupta, D.: Evolving Fuzzy Classifiers for Intrusion Detection. In: Proceedings of 2002 IEEE Workshop on Information Assurance. United States Military Academy, IEEE, West Point, NY (2002)

    Google Scholar 

  16. Miller, S.: Wi-Fi Security. McGraw-Hill, New York (2003)

    Google Scholar 

  17. McGill, W., Ayyub, B.: A Multicriteria Security System Performance Assessment Using Fuzzy Logic. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4(4), 484–504 (2007)

    Article  Google Scholar 

  18. Luo, J.: Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection. Unpublished MSc. thesis. Mississippi State University (1999)

    Google Scholar 

  19. Dickerson, J.E., Dickerson, J.A.: Fuzzy Network Profiling for Intrusion Detection. In: 19th International Conference of the North American Fuzzy Information Processing Society, pp. 301–306. IEEE, Atlanta (2000)

    Google Scholar 

  20. Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy Intrusion Detection. In: Joint 9th IFSA World Congress and 20th NAFIPS International Conference, 2001, Vancouver, pp. 1506–1510. IEEE, Piscataway (2001)

    Google Scholar 

  21. Zhang, B., Yin, J., Hag, J.: Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. In: Wang, L., Jin, Y. (eds.) Fuzzy Systems and Knowledge Discovery, pp. 629–634. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  22. Yao, L., ZhiTang, L., Shuyu, L.: A Fuzzy Anomaly Detection Algorithm for IPv6. In: Second IEEE International Conference on Semantics, Knowledge and Grid, SKG 2006, Guilin, Guangxi, China, pp. 67–70 (2006)

    Google Scholar 

  23. Xin, J., Dickerson, J.E., Dickerson, J.A.: Fuzzy feature extraction and visualization for intrusion detection. In: 12th IEEE International Conference on Fuzzy Systems, 2003, pp. 1249–1254. IEEE, St. Louis. MO. (2003)

    Google Scholar 

  24. Meyers, M.: Computer Forensics: Towards Creating A Certification Framework. Unpublished MSc. thesis. Purdue University (2005)

    Google Scholar 

  25. Johansson, C.: Computer Forensic Text Analysis with Open Source Software. Unpublished MSc. thesis. Blekinge Institute of Technology (2003)

    Google Scholar 

  26. Kim, J., Kim, D., Noh, B.: A Fuzzy Logic Based Expert System as a Network Forensics. In: IEEE International Conference on Fuzzy Systems 2004, Budapest, pp. 879–884 (2004)

    Google Scholar 

  27. Wai, H.: Research in Computer Forensics. Unpublished MSc. thesis. Naval Postgraduate School (2002)

    Google Scholar 

  28. Pan, L., Savoldi, A., Gubian, B., Batten, L.: Measure of Integrity Leakage in Live Forensic Context. In: 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing Harbin, China, pp. 534–537 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Al Amro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Amro, S.A., Chiclana, F., Elizondo, D.A. (2012). Application of Fuzzy Logic in Computer Security and Forensics. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25237-2_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25236-5

  • Online ISBN: 978-3-642-25237-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics