Research on Neuro-Fuzzy Inference System in Hierarchical Intrusion Detection

被引:2
作者
Zhou, Yu-Ping [1 ,2 ]
Fang, Jian-An [1 ]
Zhou, Yu-Ping [1 ,2 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
[2] Zhangzhou Normal Univ, Dept Comp Sci Engn, Zhangzhou 363000, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS | 2009年
关键词
Intrusion detection system; genetic algorithm; PCA Network; Fuzzy inference;
D O I
10.1109/ITCS.2009.58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection technique has become increasingly important in the area of network security research. It is innovative that various soft computing approaches have been applied to the intrusion detection field. This paper presents an intelligent intrusion detection system which incorporates several soft computing techniques to implement either misuse or anomaly detection. Genetic algorithm is used to optimize the structure of the system. In the proposed system principal component analysis neural network is used to reduce the dimensions of the feature space. An enhanced Fuzzy C-Means clustering algorithm is used to cluster the preprocessed data to obtain fuzzy rules. And a Hierarchical Neuro-Fuzzy classifier is developmented. The experiments and evaluations of the proposed method were performed with the KDD Cup 99 intrusion detection dataset. Results indicate the high detection accuracy for intrusion attacks and low false alarm rate of the reliable system.
引用
收藏
页码:253 / +
页数:2
相关论文
共 12 条
[1]  
AGARWAL R, 2000, RC21719 U MINN DEP C
[2]  
[Anonymous], 1998, NEURAL NETWORKS COMP
[3]  
Diamantaras K. I., 1996, PRINCIPAL COMPONENT
[4]   ANFIS - ADAPTIVE-NETWORK-BASED FUZZY INFERENCE SYSTEM [J].
JANG, JSR .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1993, 23 (03) :665-685
[5]  
Lee W. L. W., 1999, P 1999 IEEE S SEC PR
[6]   A hierarchical intrusion detection model based on the PCA neural networks [J].
Liu, Guisong ;
Yi, Zhang ;
Yang, Shangming .
NEUROCOMPUTING, 2007, 70 (7-9) :1561-1568
[7]  
PASHA MF, 2005, LECT NOTES ARTIF INT, V3930, P662
[8]  
Sabhnani M, 2003, MLMTA'03: INTERNATIONAL CONFERENCE ON MACHINE LEARNING
[9]  
MODELS, TECHNOLOGIES AND APPLICATIONS, P209
[10]  
Stolfo SalvatoreJ., 2000, Cost-based modeling for fraud and intrusion detection: Results from the jam project, discex, 02:1130