Intrusion detection using a linguistic hedged fuzzy-XCS classifier system

被引:11
作者
Marin-Blazquez, Javier G. [1 ]
Martinez Perez, Gregorio [1 ]
机构
[1] Univ Murcia, Fac Informat, Dept Ingn Informac & Comunicac, E-30071 Murcia, Spain
关键词
Genetic Algorithm; Intrusion Detection; Anomaly Detection; Intrusion Detection System; Security Expert;
D O I
10.1007/s00500-008-0322-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems (IDS) are a fundamental defence component in the architecture of the current telecommunication systems. Misuse detection is one of the different approaches to create IDS. It is based on the automatic generation of detection rules from labelled examples. Such examples are either attacks or normal situations. From this perspective the problem can be viewed as a supervised classification one. In this sense, this paper proposes the use of XCS as a classification technique to aid in the tasks of misuse detection in IDS systems. The final proposed XCS variant includes the use of hedged linguistic fuzzy classifiers to allow for interpretability. The use of this linguistic fuzzy approach provides with both the possibility of testing human designed detectors and a posteriori human fine tuning of the models obtained. To evaluate the performance not only several classic classification problems as Wine or Breast Cancer datasets are considered, but also a problem based on real data, the KDD-99. This latter problem, the KDD-99, is a classic in the literature of intrusion systems. It shows that with simple configurations the proposed variant obtains competitive results compared with other techniques shown in the recent literature. It also generates human interpretable knowledge, something very appreciated by security experts. In fact, this effort is integrated into a global detection architecture, where the security administrator is guiding part of the intrusion detection (and prevention) process.
引用
收藏
页码:273 / 290
页数:18
相关论文
共 50 条
[31]   Intrusion Detection System Using WoSAD Method [J].
Sridevi, R. ;
Nithya, N. .
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 :423-430
[32]   Intrusion Detection System Using Genetic Algorithm [J].
Benaicha, Salah Eddine ;
Saoudi, Lalia ;
Guermeche, Salah Eddine Bouhouita ;
Lounis, Ouarda .
2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, :564-568
[33]   Performance of Intrusion Detection System using GRNN [J].
Choudhary, Amit Kumar ;
Swarup, Akhilesh .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12) :219-222
[34]   A Resilient Intrusion Detection System for IoT Environment Based on a Modified Stacking Ensemble Classifier [J].
Aishwarya Vardhan ;
Prashant Kumar ;
Lalit K. Awasthi .
SN Computer Science, 5 (8)
[35]   INTELLIGENT NETWORK-MISUSE-DETECTION-SYSTEM USING NEUROTREE CLASSIFIER [J].
Muthukumar, B. ;
Sindhu, S. S. Sivatha ;
Geetha, S. ;
Kannan, A. .
NEURAL NETWORK WORLD, 2015, 25 (05) :541-564
[36]   Layered Approach for Intrusion Detection Using Naive Bayes Classifier [J].
Sharma, Neelam ;
Mukherjee, Saurabh .
PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, :639-644
[37]   Intrusion detection using fuzzy association rules [J].
Tajbakhsh, Arman ;
Rahmati, Mohammad ;
Mirzaei, Abdolreza .
APPLIED SOFT COMPUTING, 2009, 9 (02) :462-469
[38]   Intrusion Detection using Naive Bayes Classifier with Feature Reduction [J].
Mukherjee, Saurabh ;
Sharma, Neelam .
2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 :119-128
[39]   Anomaly Based Intrusion Detection Using Meta Ensemble Classifier [J].
Boro, Debojit ;
Nongpoh, Bernard ;
Bhattacharyya, Dhruba K. .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, :143-147
[40]   Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier [J].
Kulikov, D. A. ;
Platonov, V. V. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) :1080-1086