Anomaly detection based on fuzzy rules

被引:0
作者
Jiao W. [1 ]
Li Q. [2 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
[2] Shandong University, Jinan
关键词
Anomaly detection; Intrusion detection; Network security; Web application;
D O I
10.23940/ijpe.18.02.p19.376385
中图分类号
学科分类号
摘要
Essentially, the fuzzy assert rule library is the fuzzy decision tree. A fuzzy decision tree growth algorithm based on local dynamic optimization is present. Following the idea of the greedy strategy, the algorithm ensures that once a continuous attribute is chosen as a branch node, the membership functions of this attribute after fuzzifying is dynamically optimized. On the other hand, according to fuzzy logic, enhanced Apriori algorithm is present to all the fuzzy frequent item sets composed of fuzzified attributes of multiple events. Then, the fuzzy frequent item sets are transformed into fuzzy association rules that compose the fuzzy association rule library. As for a multiple event sequence, eight different detection algorithms are provided and tested on the same platform. Experiments show that two new algorithms using the fuzzy decision tree and fuzzy association rule library detection models get the highest score. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:376 / 385
页数:9
相关论文
共 50 条
[21]   LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory [J].
Davis, Neema ;
Raina, Gaurav ;
Jagannathan, Krishna .
PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2019, PT I, 2019, 11804 :572-583
[22]   Anomaly detection based on weighted fuzzy-rough density [J].
Yuan, Zhong ;
Chen, Baiyang ;
Liu, Jia ;
Chen, Hongmei ;
Peng, Dezhong ;
Li, Peilin .
APPLIED SOFT COMPUTING, 2023, 134
[23]   Anomaly behavior detection and reliability assessment of control systems based on association rules [J].
Jie, Xinchun ;
Wang, Haikuan ;
Fei, Minrui ;
Du, Dajun ;
Sun, Qing ;
Yang, T. C. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 :90-99
[24]   FADS: A fuzzy anomaly detection system [J].
Li, Dan ;
Wang, Kefei ;
Deogun, Jitender S. .
ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 4062 :792-798
[25]   ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency [J].
Cai, Jun ;
Wei, Zeheng ;
Luo, Jianzhen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) :10647-10656
[26]   Towards fuzzy anomaly detection-based security: a comprehensive review [J].
Mohammad Masdari ;
Hemn Khezri .
Fuzzy Optimization and Decision Making, 2021, 20 :1-49
[27]   Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm [J].
Aminanto, Muhamad Erza ;
Kim, HakJu ;
Kim, Kyung-Min ;
Kim, Kwangjo .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) :176-183
[28]   Anomaly Detection of Network Traffic Based on Intuitionistic Fuzzy Set Ensemble [J].
Tian, He ;
Guo, Kaihong ;
Guan, Xueting ;
Wu, Zheng .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (07) :538-546
[29]   Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach [J].
Asmuss, Julija ;
Lauks, Gunars .
2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, :313-318
[30]   Optimization of membership functions in anomaly detection based on fuzzy data mining [J].
Zhu, TQ ;
Xiong, P .
PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, :1987-1992