TY - GEN
T1 - GNP-based fuzzy class-association-rule mining with sub-attribute utilization
AU - Ranjan, Abhishek
AU - Selvaraj, Rajalakshmi
AU - Kuthadi, Venu Madhav
N1 - Publisher Copyright:
© 2012 IADIS.
PY - 2012
Y1 - 2012
N2 - Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose a novel fuzzy class-association rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. An incomplete database includes missing data in some tuples; however, the proposed method can extract important rules using these tuples. The GNP-Based Fuzzy Class- Association-Rule Mining performs in existing data only it cannot newly added Intrusion. Therefore we present Intrusion Detection Systems based on analyzing process traces. It also include following steps in GNP-Based Fuzzy Class- Association-Rule Process data model as a mathematical representation of normal behavior Improving the process data model improves the model of normal behavior. It should represent the underlying truth of normalcy of the data Uses cluster centers or centroids Uses distances away from the centroids Convert the Data to the Training Data.
AB - Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose a novel fuzzy class-association rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. An incomplete database includes missing data in some tuples; however, the proposed method can extract important rules using these tuples. The GNP-Based Fuzzy Class- Association-Rule Mining performs in existing data only it cannot newly added Intrusion. Therefore we present Intrusion Detection Systems based on analyzing process traces. It also include following steps in GNP-Based Fuzzy Class- Association-Rule Process data model as a mathematical representation of normal behavior Improving the process data model improves the model of normal behavior. It should represent the underlying truth of normalcy of the data Uses cluster centers or centroids Uses distances away from the centroids Convert the Data to the Training Data.
UR - http://www.scopus.com/inward/record.url?scp=84944048602&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84944048602&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84944048602
T3 - Proceedings of the IADIS International Conference Information Systems 2012, IS 2012
SP - 11
EP - 17
BT - Proceedings of the IADIS International Conference Information Systems 2012, IS 2012
A2 - Isaias, Pedro
A2 - Rodrigues, Luis
A2 - Nunes, Miguel Baptista
A2 - Powell, Philip
PB - IADIS
T2 - IADIS International Conference on Information Systems 2012, IS 2012
Y2 - 10 March 2012 through 12 March 2012
ER -