Open Access Open Access  Restricted Access Subscription or Fee Access

The Foundations and Principles of Computational Intelligence

S Murugan, K. Kuppusamy

Abstract


Artificial intelligence (AI) assumes a driving part in security administrations. A dynamic model Intelligent Intrusion Detection System (IIDS), in view of particular AI approach for intrusion detection. The strategies that are being explored incorporate neural networks and fuzzy logic with network profiling that uses basic data mining procedures to handle the network data. Suspicious interruptions can be followed back to its unique source way and any traffic from that specific source will be diverted back to them in future. AI is both the intelligence of machines and the branch of Computer Science which purposes to make it, through the study and plan of smart specialists or discerning operators, where an intelligent agent is a framework that sees its surroundings and takes activities which boost its risks of accomplishment. Achievements incorporate compelled and very much characterized issues, for example, amusements, crossword-comprehending and optical character recognition. Among the qualities that specialists trust machines will show are thinking, information, arranging, learning, correspondence, perception, and the capacity to move and control objects. In the field of AI there is no accord on how nearly the mind ought to be simulated.

Keywords: artificial intelligence, data mining, intelligent intrusion detection system

Full Text:

PDF

References


Bezdek J. What is computational Intelligence? In: Computational Intelligence Imitationg Life. Zurada L., Marks R., Robinsons C., Eds. New York: IEEE Press; 1994. 1–12p.

Hentea M. Intelligent system for information security management: architecture and design issues. Issues Inform Sci Inform Technol. 2007a; 4: 29–43p.

Manikopoulos C., Papavassiliou S. Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun Mag. 2002; 40(10): 76–82p.

Rodd M.G. Real-time AI for industrial control: a review. ICARV ’92 Second International Conference on Automation, Robotics and Computer Vision. Singapore; 1992. 36–38p.

Hentea M. Architecture and design issues in a hybrid knowledge-based expert system for intelligent quality control. PhD Thesis, Illinois Institute of Technology, Chicago, Illinois; 1997b.

Passino K.M., Ozguner U.U. Intelligent control: From theory to application. IEEE Expert Intell Syst Appl. 1996; 11(2): 28–30p.

Cardoso R.C., Freire M.M. Security vulnerabilities and exposures in internet systems and services. In: Encyclopedia of Multimedia Technology and Networking. Pagani M., Ed. Hershey, Pennsylvania: Idea Group; 2005. 910–6p.

Ramanujan S., Capretez M.A.M. ADAM: A multi-agent system for autonomous database administration and maintenance. Int J Intell Inform Technol. 2005; 1(3): 14–33p.

Yao Y., Wang F.-Y., Zeng D., et al. Rule + exception strategies for security information analysis. IEEE Intell Syst. 2005; 19(5): 52–57p.

Kung S.Y., Mak M.W., Lin S.H. Biometric Authentication. Upper Saddle River, New Jersey: Prentice Hall Professional Technical Reference; 2005.

Willow C.C. A neural network-based agent framework for mail server management. Int J Intell Inform Technol. 2005; 1(4): 36–52p.




DOI: https://doi.org/10.37628/ijaic.v1i2.115

Refbacks

  • There are currently no refbacks.