An Enhanced Fuzzy ARM Approach for Intrusion Detection

نویسندگان

  • Nasser Abouzakhar
  • Huankai Chen
  • Bruce Christianson
چکیده

The integration of fuzzy logic with data mining methods such as association rules has achieved interesting results in various digital forensics applications. As a data mining technique, the association rule mining (ARM) algorithm uses ranges to convert any quantitative features into categorical ones. Such features lead to the sudden boundary problem, which can be smoothed by incorporating fuzzy logic so as to develop interesting patterns for intrusion detection. This paper introduces a Fuzzy ARM-based intrusion detection model that is tested on the CAIDA 2007 backscatter network traffic dataset. Moreover, the authors present an improved algorithm named Matrix Fuzzy ARM algorithm for mining fuzzy association rules. The experiments and results that are presented in this paper demonstrate the effectiveness of integrating fuzzy logic with association rule mining in intrusion detection. The performance of the developed detection model is improved by using this integrated approach and improved algorithm. process of monitoring computer and/or network activities and events, analysing them for sings of security threats such as unauthorised access, malicious activities and violations for security policy. Intrusion Detection Systems (IDSs) are capable of observing patterns of activities in user accounts and detect malicious behaviour. Intrusion detection systems are usually divided into two types (Carter, 2002): misuse detection approach and anomaly detection approach. The misuse detection approach tends to look for events that match certain network behaviors against well-defined intrusive patterns that are precisely written in advance. The anomaly detection approach attempts to evaluate a user DOI: 10.4018/jdcf.2011040104 42 International Journal of Digital Crime and Forensics, 3(2), 41-61, April-June 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. or system behavior and consider intrusive or irregular activities as some deviation from the normal patterns. Such approach is capable of identifying newly developed attacks for which a well-defined intrusive pattern does not exist. Denial-of service (DoS) attack (Moore et al., 2006; Tague, et al., 2009) is a computer network-based attack where an attacker floods a computer system or a network (victim) with useless traffic. Such attacks are difficult to be avoided since it is hard to distinguish the “good” requests from the “bad” ones. The association rule mining (ARM) technique (Agrawal & Srikant, 1994) has been applied into anomaly detection to automatically mine abnormal patterns from network data and/or audit data. One of the major limitations of such a mining approach (Changguo et al., 2009; Bridges, et al., 2000) of dealing with quantitative features is the sudden boundary problem. For example, an intrusion that deviates only slightly from the normal acceptable patterns may not be detected or a small change in normal patterns may trigger a false alarm. In order to deal with such a problem and improve the flexibility of the system, fuzzy logic has been integrated with ARM technique for intrusion detection. It is possible to integrate fuzzy logic (Luo, 1999) with ARM as many quantitative features that are involved in intrusion detection can be treated as fuzzy variables. An example of quantitative feature is the number of different SYN flags in a fixed-interval of 1 sec or 2 sec. In traditional association rule mining, given a quantitative boundary, the quantitative feature can be split into two levels of categories i.e. Low or High. Any values of the quantitative feature falling below the boundary will be categorised as Low. Those values falling above the boundary will be categorised as High. Regardless of their distance to the boundary all values are categorised as either Low or High. Such an approach leads to the sudden separation of Low and High, which can be smoothed by integrating the Fuzzy Logic. We present a new FARM algorithm named Matrix Fuzzy Association Rule Mining (Matrix FARM) algorithm. This algorithm improves the performance of the proposed detection model which uses FARM techniques to mine new patterns from the network traffic dataset. The model calculates the similarity between the new patterns and the normal patterns mined from normal network traffic. If the similarity value is under a user-defined threshold, the model will generate an alarm indicate that there may be some anomalies occurred in the network traffic. The evaluation of the proposed new model is achieved by testing the performance of the developed Matrix FARM using standard methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDCF

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2011