Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

نویسندگان

  • Mahsa Fazaeli Javan Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mansoor Zolghadri Jahromi Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mohammad Hadi Sadreddini Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
  • Mohammad Reza Moosavi Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
چکیده مقاله:

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a subset of system requirements. There are many non-functional requirements for an applicable and practical IDS. The process should be online, incremental and adaptive to ever changing behaviors of normal users and attackers. Moreover providing comprehensive and interactive IDS could both, enhance the performance of the system and extend the knowledge of domain experts.In this paper, we propose a fuzzy rule-based classification system using a hierarchical rule learning method. In each stage of the hierarchy, a set of rules with certain length of antecedent are investigated. A novel rule weighting method, based on the entropy measure, determines the appropriateness of each rule. The experimental results on KDD99 intrusion detection dataset show the effectiveness of the proposed method in tackling the tradeoff between accuracy and comprehensibility of fuzzy rule-based systems. Although the dimension of antecedents is not limited, the resultant rule-base contains a small number of complex rules, which are essential to reach the desired accuracy.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

entropy based fuzzy rule weighting for hierarchical intrusion detection

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System

The proliferation of computer networks has brought network security to the forefront. It has become imperative to devise new methods for network intrusion detection. Current methods are frequently unable to detect polymorphic or novel attack modes. In addition, the enormous volume of network traffic makes it difficult to monitor and evaluate all features of communication packets on the network....

متن کامل

A Margin-based Model with a Fast Local Searchnewline for Rule Weighting and Reduction in Fuzzynewline Rule-based Classification Systems

Fuzzy Rule-Based Classification Systems (FRBCS) are highly investigated by researchers due to their noise-stability and  interpretability. Unfortunately, generating a rule-base which is sufficiently both accurate and interpretable, is a hard process. Rule weighting is one of the approaches to improve the accuracy of a pre-generated rule-base without modifying the original rules. Most of the pro...

متن کامل

A hierarchical SOM-based intrusion detection system

An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the ...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

An Efficient Fuzzy Classifier Based on Hierarchical Fuzzy Entropy

In an earlier work, Lee et al. [1] presented a simple and fast fuzzy classifier that employed fuzzy entropy to evaluate pattern distribution information in a pattern space. In this paper, we extend his work to propose a new fuzzy classifier based on hierarchical fuzzy entropy (FC-HFE). We retained the main parts of the original structure and modified some methods (e.g., decision of the number o...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 11  شماره 3

صفحات  77- 94

تاریخ انتشار 2014-06-30

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023