Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Authors

  • Mahsa Fazaeli Javan Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mansoor Zolghadri Jahromi Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mohammad Hadi Sadreddini Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mohammad Reza Moosavi Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
Abstract:

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a subset of system requirements. There are many non-functional requirements for an applicable and practical IDS. The process should be online, incremental and adaptive to ever changing behaviors of normal users and attackers. Moreover providing comprehensive and interactive IDS could both, enhance the performance of the system and extend the knowledge of domain experts.In this paper, we propose a fuzzy rule-based classification system using a hierarchical rule learning method. In each stage of the hierarchy, a set of rules with certain length of antecedent are investigated. A novel rule weighting method, based on the entropy measure, determines the appropriateness of each rule. The experimental results on KDD99 intrusion detection dataset show the effectiveness of the proposed method in tackling the tradeoff between accuracy and comprehensibility of fuzzy rule-based systems. Although the dimension of antecedents is not limited, the resultant rule-base contains a small number of complex rules, which are essential to reach the desired accuracy.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

entropy based fuzzy rule weighting for hierarchical intrusion detection

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

full text

Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System

The proliferation of computer networks has brought network security to the forefront. It has become imperative to devise new methods for network intrusion detection. Current methods are frequently unable to detect polymorphic or novel attack modes. In addition, the enormous volume of network traffic makes it difficult to monitor and evaluate all features of communication packets on the network....

full text

A Margin-based Model with a Fast Local Searchnewline for Rule Weighting and Reduction in Fuzzynewline Rule-based Classification Systems

Fuzzy Rule-Based Classification Systems (FRBCS) are highly investigated by researchers due to their noise-stability and  interpretability. Unfortunately, generating a rule-base which is sufficiently both accurate and interpretable, is a hard process. Rule weighting is one of the approaches to improve the accuracy of a pre-generated rule-base without modifying the original rules. Most of the pro...

full text

A hierarchical SOM-based intrusion detection system

An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the ...

full text

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

full text

An Efficient Fuzzy Classifier Based on Hierarchical Fuzzy Entropy

In an earlier work, Lee et al. [1] presented a simple and fast fuzzy classifier that employed fuzzy entropy to evaluate pattern distribution information in a pattern space. In this paper, we extend his work to propose a new fuzzy classifier based on hierarchical fuzzy entropy (FC-HFE). We retained the main parts of the original structure and modified some methods (e.g., decision of the number o...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 11  issue 3

pages  77- 94

publication date 2014-06-30

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023