Anomaly detection based on fuzzy rules

被引:0
作者
Jiao W. [1 ]
Li Q. [2 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
[2] Shandong University, Jinan
关键词
Anomaly detection; Intrusion detection; Network security; Web application;
D O I
10.23940/ijpe.18.02.p19.376385
中图分类号
学科分类号
摘要
Essentially, the fuzzy assert rule library is the fuzzy decision tree. A fuzzy decision tree growth algorithm based on local dynamic optimization is present. Following the idea of the greedy strategy, the algorithm ensures that once a continuous attribute is chosen as a branch node, the membership functions of this attribute after fuzzifying is dynamically optimized. On the other hand, according to fuzzy logic, enhanced Apriori algorithm is present to all the fuzzy frequent item sets composed of fuzzified attributes of multiple events. Then, the fuzzy frequent item sets are transformed into fuzzy association rules that compose the fuzzy association rule library. As for a multiple event sequence, eight different detection algorithms are provided and tested on the same platform. Experiments show that two new algorithms using the fuzzy decision tree and fuzzy association rule library detection models get the highest score. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:376 / 385
页数:9
相关论文
共 50 条
[31]   Anomaly intrusion behavior detection based on fuzzy clustering and features selection [J].
Tang, Chenghua ;
Liu, Pengcheng ;
Tang, Shensheng ;
Xie, Yi .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (03) :718-728
[32]   Compound Fuzzy Clustering Anomaly Detection Based on Production Process Coupling [J].
Fu, Mengyao ;
Li, Yangzhao ;
Zhang, Mengfan ;
Feng, Dongqin ;
Chen, Qingyun ;
Jiang, Ying .
2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, :5708-5713
[33]   Research on Anomaly Identification of PV Power Station Operation Data Based on Fuzzy Association Rules [J].
Tang, Ren ;
Zhu, Weijun ;
He, Yongling .
IEEE ACCESS, 2024, 12 :156662-156672
[34]   Detection model of network abnormity based on fuzzy association rules for intrusion detection system [J].
Peng, XG ;
Mai, YL ;
Liu, YS ;
Wu, YS .
ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, :4858-4861
[35]   Research on Anomaly Detection Method Based on DBSCAN Clustering Algorithm [J].
Deng, Dingsheng .
2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, :439-442
[36]   Anomaly Based Wi-Fi Intrusion Detection System [J].
Satam, Pratik ;
Hariri, Salim .
2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, :377-378
[37]   To identify suspicious activity in anomaly detection based on soft computing [J].
Chimphlee, W ;
Sap, NM ;
Abdullah, AH ;
Chimphlee, S ;
Srinoy, S .
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, 2006, :359-+
[38]   A novel approach for anomaly detection in data streams: Fuzzy-statistical detection mode [J].
Li, Fenghuan ;
Zheng, Dequan ;
Zhao, Tiejun ;
Pedrycz, Witold .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 30 (05) :2611-2622
[39]   Network Anomaly Detection Based on WaveNet [J].
Kokkonen, Tero ;
Puuska, Samir ;
Alatalo, Janne ;
Heilimo, Eppu ;
Makela, Antti .
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2019, RUSMART 2019, 2019, 11660 :424-433
[40]   Factor analysis based anomaly detection [J].
Wu, NN ;
Zhang, J .
IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, :108-115