Integrated Rule Mining Based on Fuzzy GNP and Probabilistic Classification for Intrusion Detection

被引:1
作者
Lu, Nannan [1 ]
Mabu, Shingo [1 ]
Hirasawa, Kotaro [1 ]
机构
[1] Waseda Univ, Grad Sch Informat Prod & Syst, Wakamatsu Ku, 2-7 Hibikino, Kitakyushu, Fukuoka 8080135, Japan
关键词
network security; genetic network programming; intrusion detection system; fuzzy GNP; probabilistic classification;
D O I
10.20965/jaciii.2011.p0495
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing popularity of the Internet, network security has become a serious problem recently. How to detect intrusions effectively becomes an important component in network security. Therefore, a variety of algorithms have been devoted to this challenge. Genetic network programming is a newly developed evolutionary algorithm with directed graph gene structures, and it has been applied to data mining for intrusion detection systems providing good performances in intrusion detection. In this paper, an integrated rule mining algorithm based on fuzzy GNP and probabilistic classification is proposed. The integrated rule mining uses fuzzy class association rule mining algorithm to extract rules with different classes. Actually, it can deal with both discrete and continuous attributes in network connection data. Then, the classification is done probabilistically using different class rules. The integrated method showed excellent results by simulation experiments.
引用
收藏
页码:495 / 505
页数:11
相关论文
共 20 条
[1]  
Amor N. B., 2004, P 2004 ACM S APPL CO, P420, DOI DOI 10.1145/967900.967989
[2]   Improving network security using genetic algorithm approach [J].
Bankovic, Zorana ;
Stepanovic, Dusan ;
Bojanic, Slobodan ;
Nieto-Taladriz, Octavio .
COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) :438-451
[3]   A study of evolutionary multiagent models based on symbiosis [J].
Eguchi, T ;
Hirasawa, K ;
Hu, JL ;
Ota, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2006, 36 (01) :179-193
[4]   Applying data mining of fuzzy association rules to network intrusion detection [J].
El-Semary, Aly ;
Edmonds, Janica ;
Gonzalez-Pino, Jesus ;
Papa, Mauricio .
2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, :100-+
[5]   A double-deck elevator group supervisory control system using genetic network programming [J].
Hirasawa, Kotaro ;
Eguchi, Toru ;
Zhou, Jin ;
Yu, Lu ;
Hu, Jinglu ;
Markon, Sandor .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (04) :535-550
[6]  
Kim DS, 2003, LECT NOTES COMPUT SC, V2662, P747
[7]  
Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195
[8]  
Lee W., 1998, P 1998 USENIX SEC S
[9]  
Mabu S., 2010, IEEE WORLD C COMP IN
[10]   A graph-based evolutionary algorithm: Genetic Network Programming (GNP) and its extension using reinforcement learning [J].
Mabu, Shingo ;
Hirasawa, Kotaro ;
Hu, Jinglu .
EVOLUTIONARY COMPUTATION, 2007, 15 (03) :369-398