Open Access Open Access  Restricted Access Subscription or Fee Access

Efficient Intrusion Detection based on Fuzzy WAR with Genetic Network Programming using Probability Density Function

P. Prasenna, A.V.T. Raghav Ramana

Abstract


In conventional network security relies onmathematics cryptosystem and low counter security measures to
taken to prevent Intrusion detection System, although most of thisapproaches in terms of theoretically impossible to implement. One of the Evolutionary optimization techniques like Genetic Network Programming (GNP) is node based directed graph structures instead of generating a large number of rules and patterns , In this paper focusing on generalize the problem embedded in GNP with association rule mining and address to a issues in IDS and gives a
solution to detecting intrusion . Our proposed method follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.


Keywords


Intrusion Detection, Probability Density Function, Genetic Network Programming, Genetic Algorithm, Fuzzy WAR.

Full Text:

PDF

References


J. G.-P. A. El Semaray, J. Edmonds, and M.Papa, “Applying data

mining of fuzzy association rules to network intrusion detection,”

presented at the IEEE Workshop Inf., United States Military Academy,

West Point, NY, 2006.

J. Luo, “Integrating fuzzy logic with data mining methods for intrusion

detection,” Master’s thesis, Dept. Comput. Sci., Mississippi State Univ.,

Starkville, MS, 1999.

R. P. Lippmann, D. J. Fried, I. Graf, J. Haines, K. P. Kendall, D.

McClung, D.Weber, S.Webster,D.Wyschogrod, R. K. Cunningham,

andM.A. Zissman, “Evaluating intrusion detection systems: The 1998

DARPA offline intrusion detection evaluation,” in Proc. DARPA Inf.

Survivability Conf. Expo.. vol. 2, Los Alamitos, CA: IEEE Comput.

Soc. Press, 2000.

Kddcup 1999 data [Online]. Available: kdd.ics.uci.edu/databases/ kddcu

p99/kddcup99.html.

Darpa Intrusion Detection datasets [Online]. Available:www.ll.mit.edu/

mission /communications/ist/corpora/ideval/data/index.html.

J. Zhang, M. Zulkernine, and A. Haque, “Random-forests-based network

intrusion detection systems,” IEEE Trans. Syst., Man, Cybern. C, Appl.

Rev., vol. 38, no. 5, pp. 649–659, Sep. 2008.

W. Lee, S. J. Hershkop, P. K. Chan, E. Eskin, W. Fan, M. Miller, S.

Hershkop and J. Zhang, ”Real Time Data Mining-based Intrusion

Detection”, In Proc. of the DISCEX II 2001. Anaheim, Vol. 1, pp. 89-

, 2001.

S. Mabu, K. Hirasawa and J. Hu, ”A Graph-Based Evolutionary

Algorithm: Genetic Network Programming(GNP) and Its Extension

Using Reinforcement Learning”, Evolutionary Computation. MIT press,

Vol. 15, No. 3, pp. 369-398, 2007.

Gyenesei, A.: Mining Weighted Association Rules for Fuzzy

Quantitative Items, Proceedings of PKDD Conference pp. 416--423

(2000).

Shu, Y. J., Tsang, E., Yeung, Daming, S.: Mining Fuzzy Association

Rules with Weighted Items, IEEE International Conference on Systems,

Man, and Cybernetics, (2000).

Lu, J-J.: Mining Boolean and General Fuzzy Weighted Association

Rules in Databases, Systems Engineering-Theory & Practice, 2, 28--32

(2002).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.