Intrusion detection using fuzzy association rules

被引:120
|
作者
Tajbakhsh, Arman [1 ]
Rahmati, Mohammad [1 ]
Mirzaei, Abdolreza [1 ]
机构
[1] Amirkabir Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Association rule; Association hyper-edge; Classification; Intrusion detection; Matching measure;
D O I
10.1016/j.asoc.2008.06.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding vulnerabilities. In this paper, a novel framework based on data mining techniques is proposed for designing an IDS. In this framework, the classification engine, which is actually the core of the IDS, uses Association Based Classification (ABC). The proposed classification algorithm uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rulesets are exploited as descriptive models of different classes. The compatibility of any new sample (which is to be classified) with different class rulesets is assessed by the use of some matching measures and the class corresponding to the best matched ruleset is declared as the label of the sample. A new method is also proposed to speed up the rule induction algorithm via reducing items that may be included in extracted rules. KDD-99 dataset is used to evaluate the proposed framework. Although results on unseen attacks are not so promising, total detection rate and detection rate of known attacks is significant while false positive rate is kept low. Results are compared with some recent works in the literature using the same dataset. Generally, the proposed approach outperforms other methods, specially in terms of false positive rate. (c) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [1] Hybrid Approach for Intrusion Detection using Fuzzy Association Rules
    Douzi, Samira
    Benchaji, Ibtissam
    El Ouahidi, Bouabid
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [2] Application of fuzzy association rules in intrusion detection
    Wu, KaiXing
    Hao, Juan
    Wang, Chunhua
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 211 - 214
  • [3] Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    Luo, JX
    Bridges, SM
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2000, 15 (08) : 687 - 703
  • [4] Intrusion Detection Based on Immune Principles and Fuzzy Association Rules
    Zhang Lei
    Meng Lingrui
    Hou Chunjie
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 31 - 35
  • [5] The Optimization and Enhancement of Network Intrusion Detection through Fuzzy Association Rules
    Boonyopakorn, Pongsarun
    2019 6TH INTERNATIONAL CONFERENCE ON TECHNICAL EDUCATION (ICTECHED6) AND 11TH NATIONAL CONFERENCE ON TECHNICAL EDUCATION (NCTECHED11), 2019,
  • [6] Genetic-Fuzzy Association Rules for Network Intrusion Detection Systems
    Su, Ming-Yang
    Lin, Chun-Yuen
    Chien, Sheng-Wei
    Hsu, Han-Chung
    IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), 2011, : 2046 - 2052
  • [7] Applying data mining of fuzzy association rules to network intrusion detection
    El-Semary, Aly
    Edmonds, Janica
    Gonzalez-Pino, Jesus
    Papa, Mauricio
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 100 - +
  • [8] Detection model of network abnormity based on fuzzy association rules for intrusion detection system
    Peng, XG
    Mai, YL
    Liu, YS
    Wu, YS
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4858 - 4861
  • [9] Anomaly detection using fuzzy association rules
    Dolores Ruiz, M.
    Martin-Bautista, Maria J.
    Sanchez, Daniel
    Vila, Maria-Amparo
    Delgado, Miguel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 25 - 37
  • [10] Association Rules Applied to Intrusion Detection
    Mao Ping ping
    WuhanUniversityJournalofNaturalSciences, 2002, (04) : 426 - 430