An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

被引:110
作者
Mabu, Shingo [1 ]
Chen, Ci [1 ]
Lu, Nannan [1 ]
Shimada, Kaoru [1 ]
Hirasawa, Kotaro [1 ]
机构
[1] Waseda Univ, Grad Sch Informat Prod & Syst, Tokyo 1698050, Japan
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2011年 / 41卷 / 01期
关键词
Class-association-rule mining; evolutionary computation; fuzzy membership function; intrusion detection; ALGORITHM;
D O I
10.1109/TSMCC.2010.2050685
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the Internet services spread all over the world, many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class-association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. Experimental results with KDD99Cup and DARPA98 databases from MIT Lincoln Laboratory show that the proposed method provides competitively high detection rates compared with other machine-learning techniques and GNP with crisp data mining.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 33 条
[1]  
Aggarwal C. C., 2001, SIGMOD Record, V30, P37, DOI 10.1145/376284.375668
[2]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[3]  
[Anonymous], GENETIC PROGRAMMING
[4]  
[Anonymous], P DARPA INF SURV C E
[5]  
[Anonymous], DARPA intrusion detection data sets
[6]   Improving network security using genetic algorithm approach [J].
Bankovic, Zorana ;
Stepanovic, Dusan ;
Bojanic, Slobodan ;
Nieto-Taladriz, Octavio .
COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) :438-451
[7]  
CROSBIE M, 1995, AAAI FALL S SERIES
[8]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[9]   A study of evolutionary multiagent models based on symbiosis [J].
Eguchi, T ;
Hirasawa, K ;
Hu, JL ;
Ota, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2006, 36 (01) :179-193
[10]  
ELSEMARAY JGP, 2006, IEEE WORKSH INF US M