Announcement
Starting on July 4, 2018 the Indonesian Publication Index (IPI) has been acquired by the Ministry of Research Technology and Higher Education (RISTEKDIKTI) called GARUDA Garba Rujukan Digital (http://garuda.ristekdikti.go.id)
For further information email to portalgaruda@gmail.com

Thank you
Logo IPI  
Journal > International Journal of Electrical and Computer Engineering (IJECE) > Intelligent Detection of Intrusion into Databases Using Extended Classifier System (XCS)

 

Full Text PDF (143 kb)
International Journal of Electrical and Computer Engineering (IJECE)
Vol 3, No 5: October 2013
Intelligent Detection of Intrusion into Databases Using Extended Classifier System (XCS)
Moshtaghi Yazdani, Navid ( University of Tehran)
Shariat Panahi, Masoud ( University of Tehran)
Sadeghi Poor, Ehsan ( University of Tehran)
Article Info   ABSTRACT
Published date:
06 Jul 2013
 
With increasing tendency of users to distributed computer systems in comparison with concentrat-ed systems, intrusion into such systems has emerged as a serious challenge. Since techniques of intrusion into systems are being intelligent, it seems necessary to use intelligent methods to en-counter them. Success of the intrusion systems depends on the strategy employed in these sys-tems for attack detection. Application of eXtended Classifier Systems (XCS) is proposed in this paper for detection of intrusions to databases. The extended classifier systems which are known as one of the most successful types of learning agents create a set of stochastic rules and com-plete them based on the methods inspired from human learning process. Thereby, they can grad-ually get a comprehensive understanding of the environment under study which enables them to predict the correct answer at an acceptable accuracy once encountered with new issues. The method suggested in this paper an improved version of extended classifier systems is “trained” using a set of existing examples in order to identify and avoid attempts to intrude computer sys-tems during phases of application and encountering these attempts. The proposed method has been tested on several problems to demonstrate its performance while its results indicate a 91% detection of various known intrusions to the databases.
Copyrights © 2013