Efficient Intrusion Detection based on Fuzzy WAR with Genetic Network Programming using Probability Density Function
Abstract
In conventional network security relies onmathematics cryptosystem and low counter security measures to
taken to prevent Intrusion detection System, although most of thisapproaches in terms of theoretically impossible to implement. One of the Evolutionary optimization techniques like Genetic Network Programming (GNP) is node based directed graph structures instead of generating a large number of rules and patterns , In this paper focusing on generalize the problem embedded in GNP with association rule mining and address to a issues in IDS and gives a
solution to detecting intrusion . Our proposed method follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.
Keywords
Full Text:
PDFReferences
J. G.-P. A. El Semaray, J. Edmonds, and M.Papa, “Applying data
mining of fuzzy association rules to network intrusion detection,”
presented at the IEEE Workshop Inf., United States Military Academy,
West Point, NY, 2006.
J. Luo, “Integrating fuzzy logic with data mining methods for intrusion
detection,” Master’s thesis, Dept. Comput. Sci., Mississippi State Univ.,
Starkville, MS, 1999.
R. P. Lippmann, D. J. Fried, I. Graf, J. Haines, K. P. Kendall, D.
McClung, D.Weber, S.Webster,D.Wyschogrod, R. K. Cunningham,
andM.A. Zissman, “Evaluating intrusion detection systems: The 1998
DARPA offline intrusion detection evaluation,” in Proc. DARPA Inf.
Survivability Conf. Expo.. vol. 2, Los Alamitos, CA: IEEE Comput.
Soc. Press, 2000.
Kddcup 1999 data [Online]. Available: kdd.ics.uci.edu/databases/ kddcu
p99/kddcup99.html.
Darpa Intrusion Detection datasets [Online]. Available:www.ll.mit.edu/
mission /communications/ist/corpora/ideval/data/index.html.
J. Zhang, M. Zulkernine, and A. Haque, “Random-forests-based network
intrusion detection systems,” IEEE Trans. Syst., Man, Cybern. C, Appl.
Rev., vol. 38, no. 5, pp. 649–659, Sep. 2008.
W. Lee, S. J. Hershkop, P. K. Chan, E. Eskin, W. Fan, M. Miller, S.
Hershkop and J. Zhang, ”Real Time Data Mining-based Intrusion
Detection”, In Proc. of the DISCEX II 2001. Anaheim, Vol. 1, pp. 89-
, 2001.
S. Mabu, K. Hirasawa and J. Hu, ”A Graph-Based Evolutionary
Algorithm: Genetic Network Programming(GNP) and Its Extension
Using Reinforcement Learning”, Evolutionary Computation. MIT press,
Vol. 15, No. 3, pp. 369-398, 2007.
Gyenesei, A.: Mining Weighted Association Rules for Fuzzy
Quantitative Items, Proceedings of PKDD Conference pp. 416--423
(2000).
Shu, Y. J., Tsang, E., Yeung, Daming, S.: Mining Fuzzy Association
Rules with Weighted Items, IEEE International Conference on Systems,
Man, and Cybernetics, (2000).
Lu, J-J.: Mining Boolean and General Fuzzy Weighted Association
Rules in Databases, Systems Engineering-Theory & Practice, 2, 28--32
(2002).
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.