A Class Association Rule Based Classifier Using Probability Density Functions for Intrusion Detection Systems

被引:1
作者
Mabu, Shingo [1 ]
Li, Wenjing [2 ]
Hirasawa, Kotaro [2 ]
机构
[1] Yamaguchi Univ, Grad Sch Sci & Engn, 2-16-1 Tokiwadai, Ube, Yamaguchi 7558611, Japan
[2] Waseda Univ, Grad Sch Informat Prod & Syst, Wakamatsu Ku, Kitakyushu, Fukuoka 8080135, Japan
关键词
intrusion detection; classification; probability distribution; evolutionary computation; class association rule mining;
D O I
10.20965/jaciii.2015.p0555
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the number of computer systems connected to the Internet is increasing exponentially, the computer security has become a crucial problem, and many techniques for Intrusion detection have been proposed to detect network attacks efficiently. On the other hand, data mining algorithms based on Genetic Network Programming (GNP) have been proposed and applied to Intrusion detection recently. GNP is a graph-based evolutionary algorithm and can extract many important class association rules by making use of the distinguished representation ability of the graph structure. In this paper, probabilistic classification algorithms based on multi-dimensional probability distribution are proposed and combined with conventional class association rule mining of GNP, and applied to network intrusion detection for the performance evaluation. The proposed classification algorithms are based on 1) one-dimensional probability density functions and 2) a two-dimensional joint probability density function. These functions represent the distribution of normal and intrusion accesses and efficiently classify a new access data into normal, known intrusion or even unknown intrusion. The simulations using KDD99Cup database from MIT Lincoln Laboratory show some advantages of the proposed algorithms over the conventional mean and standard deviation-based method.
引用
收藏
页码:555 / 566
页数:12
相关论文
共 32 条
[1]  
Agrawal R., 1994, P 20 INT C VER LARG, VVolume 1215, P487
[2]  
[Anonymous], 1989, GENETIC ALGORITHM SE
[3]   Improving network security using genetic algorithm approach [J].
Bankovic, Zorana ;
Stepanovic, Dusan ;
Bojanic, Slobodan ;
Nieto-Taladriz, Octavio .
COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) :438-451
[4]  
CASEWELL B, 2004, SNORT 2 1 INTRUSION
[5]   Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming [J].
Chen, Ci ;
Mabu, Shingo ;
Shimada, Kaoru ;
Hirasawa, Kotaro .
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 5 (05) :553-559
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]   AN INTRODUCTION TO SIMULATED EVOLUTIONARY OPTIMIZATION [J].
FOGEL, DB .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (01) :3-14
[8]  
Fogel L. J., 1966, ARTIFICIAL INTELLIGE
[9]  
Folino G, 2005, LECT NOTES COMPUT SC, V3686, P54
[10]   Evolutionary neural networks for anomaly detection based on the behavior of a program [J].
Han, Sang-Jun ;
Cho, Sung-Bae .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2006, 36 (03) :559-570