Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
نویسندگان
چکیده
The purpose of the work described in this paper is to provide an intelligent intrusion detection system (IIDS) that uses two of the most popular data mining tasks, namely classification and association rules mining together for predicting different behaviors in networked computers. To achieve this, we propose a method based on iterative rule learning using a fuzzy rule-based genetic classifier. Our approach is mainly composed of two phases. First, a large number of candidate rules are generated for each class using fuzzy association rules mining, and they are pre-screened using two rule evaluation criteria in order to reduce the fuzzy rule search space. Candidate rules obtained after pre-screening are used in genetic fuzzy classifier to generate rules for the classes specified in IIDS: namely Normal, PRB-probe, DOSdenial of service, U2R-user to root and R2L-remote to local. During the next stage, boosting genetic algorithm is employed for each class to find its fuzzy rules required to classify data each time a fuzzy rule is extracted and included in the system. Boosting mechanism evaluates the weight of each data item to help the rule extraction mechanism focus more on data having relatively more weight, i.e., uncovered less by the rules extracted until the current iteration. see front matter r 2005 Elsevier Ltd. All rights reserved. .jnca.2005.06.002 nding author. dresses: [email protected] (T. Özyer), [email protected] (R. Alhajj), .ucalgary.ca (K. Barker).
منابع مشابه
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
Intrusion Detection is one of the important area of research. Our work has explored the possibility of integrating the fuzzy logic with Data Mining methods using Genetic Algorithms for intrusion detection. The reasons for introducing fuzzy logic is two fold, the first being the involvement of many quantitative features where there is no separation between normal operations and anomalies. Thus f...
متن کاملApplication of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection
Intrusion Detection System (IDS) deals with a very large amount of data that includes redundant and irrelevant features. Therefore, feature selection is a necessary data pre-processing step to design IDSs that are lightweight. In this paper, a novel feature selection method based on data mining techniques is proposed, which uses fuzzy association rules to obtain the optimum feature subset. In t...
متن کاملUse of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection
In today’s life Intrusion Detection System gain the attention, because of ability to detect the intrusion access efficiently and effectively as security is the major issue in networks. This system identifies attacks and reacts by generating alerts or blocking the unwanted data/traffic. Intrusion Detection System mainly classified as Anomaly based intrusion detection systems that have benefit of...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 30 شماره
صفحات -
تاریخ انتشار 2007