Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

被引:0
作者
Dhanalakshmi, Y. [1 ]
Babu, I. Ramesh [1 ]
机构
[1] Acharya Nagarjuna Univ, Dept Comp Sci & Engn, Guntur, AP, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 02期
关键词
Data Mining algorithms; Apriori; Fuzzy logic; Genetic algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection is one of the important area of research. Our work has explored the possibility of integrating the fuzzy logic with Data Mining methods using Genetic Algorithms for intrusion detection. The reasons for introducing fuzzy logic is two fold, the first being the involvement of many quantitative features where there is no separation between normal operations and anomalies. Thus fuzzy association rules can be mined to find the abstract correlation among different security features. We have proposed architecture for Intrusion Detection methods by using Data Mining algorithms to mine fuzzy association rules by extracting the best possible rules using Genetic Algorithms.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 7 条
[1]  
Bridges Susan M., 2000, C ONNATIONAL INF SYS
[2]  
Chan K. C. C., 1997, Proceedings of the Sixth International Conference on Information and Knowledge Management. CIKM'97, P209, DOI 10.1145/266714.266898
[3]   Fuzzy association rules:: General model and applications [J].
Delgado, M ;
Marín, N ;
Sánchez, D ;
Vila, MA .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2003, 11 (02) :214-225
[4]   Applying data mining of fuzzy association rules to network intrusion detection [J].
El-Semary, Aly ;
Edmonds, Janica ;
Gonzalez-Pino, Jesus ;
Papa, Mauricio .
2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, :100-+
[5]  
Faraoun K., 2006, INT J COMPUTATIONAL, V3, P79
[6]  
Herrera F., 2005, INT J COMPUTATIONAL, V1, P59
[7]  
Srikant R., 1996, SIGMOD Record, V25, P1, DOI 10.1145/235968.233311