Use of Genetic Algorithm with Fuzzy Class Association Rule Mining for Intrusion Detection

نویسندگان

  • Dipali Kharche
  • Rahul Patil
چکیده

In today’s life Intrusion Detection System gain the attention, because of ability to detect the intrusion access efficiently and effectively as security is the major issue in networks. This system identifies attacks and reacts by generating alerts or blocking the unwanted data/traffic. Intrusion Detection System mainly classified as Anomaly based intrusion detection systems that have benefit of detecting novel attacks having false positive rate, and Misuse based intrusion detection systems fails to detect the novel attacks. The proposed system includes Genetic algorithm and the data mining method of fuzzy logic which is a class association rule mining. Genetic algorithm is used to extract the rules which are required for anomaly detection system. The use of the fuzzy logic in proposed model deals with mixed types of attribute and avoid sharp boundary problem. As association rule mining is used to extract the sufficient rules for the user purpose rather than to extract all the rules which are useful for the misuse detection. KDD dataset from the MIT Lincoln Laboratory is used which provides high detection rates. Keywords— Data Mining, Rule Mining, Intrusion Detection System (IDS), Genetic Algorithm (GA), Network Security, Fuzzy Logic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Intrusion Detection is one of the important area of research. Our work has explored the possibility of integrating the fuzzy logic with Data Mining methods using Genetic Algorithms for intrusion detection. The reasons for introducing fuzzy logic is two fold, the first being the involvement of many quantitative features where there is no separation between normal operations and anomalies. Thus f...

متن کامل

Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening

The purpose of the work described in this paper is to provide an intelligent intrusion detection system (IIDS) that uses two of the most popular data mining tasks, namely classification and association rules mining together for predicting different behaviors in networked computers. To achieve this, we propose a method based on iterative rule learning using a fuzzy rule-based genetic classifier....

متن کامل

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy association rules that are mined from network audit data as models of " normal behavior. " To detect anoma...

متن کامل

Intrusion Detection using Fuzzy Data Mining

With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. The solution is an Intrusion Detection System (IDS) which is used to identify attacks and to react by generating an alert or blocking the unwanted data. For IDS, use of genetic...

متن کامل

Parallel Genetic Algorithms for Tuning a Fuzzy Data Mining System

In previous work, we have described methods that we have developed for tuning a fuzzy data mining system for intrusion detection using a hierarchical genetic algorithm. Unfortunately, the genetic algorithm approach is very slow due to the computational cost of the evaluation function. In this paper, we describe parallel implementations of the genetic algorithm that were run on both a multiproce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014