Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

被引:166
作者
Tsang, Chi-Ho [1 ]
Kwong, Sam [1 ]
Wang, Hanli [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
关键词
fuzzy classifier genetic algorithms; multi-objective optimization; feature selection; intrusion detection;
D O I
10.1016/j.patcog.2006.12.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in pattern recognition and network security. In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy IF-THEN rules from network traffic data for classification. The proposed fuzzy rule-based system is evolved from an agent-based evolutionary framework and multi-objective optimization. In addition, the proposed system can also act as a genetic feature selection wrapper to search for an optimal feature subset for dimensionality reduction. To evaluate the classification and feature selection performance of our approach, it is compared with some well-known classifiers as well as feature selection filters and wrappers. The extensive experimental results on the KDD-Cup99 intrusion detection benchmark data set demonstrate that the proposed approach produces interpretable fuzzy systems, and outperforms other classifiers and wrappers by providing the highest detection accuracy for intrusion attacks and low false alarm rate for normal network traffic with minimized number of features. (c) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:2373 / 2391
页数:19
相关论文
共 37 条
[1]  
AGARWAL R, 2001, P 1 SIAM C DAT MIN C
[2]  
[Anonymous], UCI MACH LEARN REP
[3]  
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775101
[4]  
BOZ O, 2002, P INT C MACH LEARN A
[5]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[6]  
Cohen W. W., 1995, P 12 INT C MACH LEAR, P115, DOI DOI 10.1016/B978-1-55860-377-6.50023-2
[7]   Ten years of genetic fuzzy systems:: current framework and new trends [J].
Cordón, O ;
Gomide, F ;
Herrera, F ;
Hoffmann, F ;
Magdalena, L .
FUZZY SETS AND SYSTEMS, 2004, 141 (01) :5-31
[8]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[9]  
DEBORDA JC, 1953, MATH DERIVATION ELEC, V44, P42
[10]  
Dickerson JE, 2001, JOINT 9TH IFSA WORLD CONGRESS AND 20TH NAFIPS INTERNATIONAL CONFERENCE, PROCEEDINGS, VOLS. 1-5, P1506, DOI 10.1109/NAFIPS.2001.943772