Abstract
Due to the growing reliance that corporations and government agencies place on their computer networks, the significance of defending these systems from attack cannot be underestimated. A single malicious encroachment into a computer network can cause a great deal of damage to an organisation. Computer Security concerns the protection of information and property from misuse by unauthorized people. Computer forensics provides methods for the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the reconstruction of criminal activities or policy violation. Fuzzy logic can properly be used to help deal with issues associated with computer security and computer forensics. This chapter deals with the use of fuzzy logic in computer security and forensics, providing a general overview of some of its applications, recent algorithms, abilities, advantages and drawbacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zadeh, L.A.: Outline of a new approach to the analysis of complex system and decision processes. IEEE Transactions on Systems Man and Cybernetics 3, 28–44 (1973)
Zadeh, L.A.: Fuzzy sets. Information and Control 8, 338–353 (1965)
Negnevitsky, M.: Artificial Intelligence: A guide to intelligent systems. Pearson Education Limited, Essex (2005)
Chen, G., Pham, T.: Introduction to fuzzy sets, fuzzy logic, and fuzzy control systems. CRC Press, Washington (2001)
Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and Applications. Prentice Hall PTR, New Jersey (1995)
Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part I. Information Sciences 8, 199–249 (1975)
Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part II. Information Sciences 8, 301–357 (1975)
Zadeh, L.A.: The concept of a linguistic variable and its applications to approximate reasoning, Part III. Information Sciences 9, 43–80 (1975)
Herrera, F., Alonso, S., Chiclana, F., Herrera-Viedma, E.: Computing with Words in Decision Making: Foundations. Trends and Prospects Fuzzy Optimization and Decision Making 8, 337–364 (2009)
Dubois, D., Ostasiewicz, W., Prade, H.: Fuzzy sets: history and basic notions. In: Dubois, D., Prade, H. (eds.) Fundamentals of Fuzzy Sets. Kluwer Academic Publishers (2000)
Mendel, J.M.: Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions. Prentice Hall, Upper Saddle River (2001)
Belman, R., Giertz, M.: On the analytic formalism of the theory of fuzzy sets. Information Science 5, 149–156 (1973)
Berenji, H.R.: Fuzzy logic controllers. In: Yager, R.R., Zadeh, L.A. (eds.) An Introduction to Fuzzy Logic Applications in Intelligent Systems. Kluwer Academic Publishers (1992)
Heydeman, J., Reijntjes, R., Babuska, R., Kaymak, U., Van Nauta Lemke, H.: Fuzzy Logic Based Security Assessment of Power Networks. Intelligent Systems Applications to Power Systems 2(9), 405–409 (1996)
Gomez, J., Dasgupta, D.: Evolving Fuzzy Classifiers for Intrusion Detection. In: Proceedings of 2002 IEEE Workshop on Information Assurance. United States Military Academy, IEEE, West Point, NY (2002)
Miller, S.: Wi-Fi Security. McGraw-Hill, New York (2003)
McGill, W., Ayyub, B.: A Multicriteria Security System Performance Assessment Using Fuzzy Logic. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4(4), 484–504 (2007)
Luo, J.: Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection. Unpublished MSc. thesis. Mississippi State University (1999)
Dickerson, J.E., Dickerson, J.A.: Fuzzy Network Profiling for Intrusion Detection. In: 19th International Conference of the North American Fuzzy Information Processing Society, pp. 301–306. IEEE, Atlanta (2000)
Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy Intrusion Detection. In: Joint 9th IFSA World Congress and 20th NAFIPS International Conference, 2001, Vancouver, pp. 1506–1510. IEEE, Piscataway (2001)
Zhang, B., Yin, J., Hag, J.: Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. In: Wang, L., Jin, Y. (eds.) Fuzzy Systems and Knowledge Discovery, pp. 629–634. Springer, Heidelberg (2005)
Yao, L., ZhiTang, L., Shuyu, L.: A Fuzzy Anomaly Detection Algorithm for IPv6. In: Second IEEE International Conference on Semantics, Knowledge and Grid, SKG 2006, Guilin, Guangxi, China, pp. 67–70 (2006)
Xin, J., Dickerson, J.E., Dickerson, J.A.: Fuzzy feature extraction and visualization for intrusion detection. In: 12th IEEE International Conference on Fuzzy Systems, 2003, pp. 1249–1254. IEEE, St. Louis. MO. (2003)
Meyers, M.: Computer Forensics: Towards Creating A Certification Framework. Unpublished MSc. thesis. Purdue University (2005)
Johansson, C.: Computer Forensic Text Analysis with Open Source Software. Unpublished MSc. thesis. Blekinge Institute of Technology (2003)
Kim, J., Kim, D., Noh, B.: A Fuzzy Logic Based Expert System as a Network Forensics. In: IEEE International Conference on Fuzzy Systems 2004, Budapest, pp. 879–884 (2004)
Wai, H.: Research in Computer Forensics. Unpublished MSc. thesis. Naval Postgraduate School (2002)
Pan, L., Savoldi, A., Gubian, B., Batten, L.: Measure of Integrity Leakage in Live Forensic Context. In: 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing Harbin, China, pp. 534–537 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Amro, S.A., Chiclana, F., Elizondo, D.A. (2012). Application of Fuzzy Logic in Computer Security and Forensics. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-25237-2_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25236-5
Online ISBN: 978-3-642-25237-2
eBook Packages: EngineeringEngineering (R0)