2011
DOI: 10.1109/tsmcc.2010.2050685
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0
2

Year Published

2011
2011
2016
2016

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 173 publications
(73 citation statements)
references
References 21 publications
0
71
0
2
Order By: Relevance
“…This dataset is still the most trustful and credible public benchmark dataset [53,54,55,56,57,58,59] for evaluating network intrusion detection algorithms. In the dataset, 41 features including 9 categorical features and 32 continuous features are extracted for each network connection.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This dataset is still the most trustful and credible public benchmark dataset [53,54,55,56,57,58,59] for evaluating network intrusion detection algorithms. In the dataset, 41 features including 9 categorical features and 32 continuous features are extracted for each network connection.…”
Section: Methodsmentioning
confidence: 99%
“…Zanero and Savaresi [25] first use unsupervised clustering to reduce the network packet payload to a tractable size, and then a traditional anomaly detection algorithm is applied to intrusion detection. Mabu et al [49] detect intrusions by mining fuzzy class association rules using genetic network programming. Panigrahi and Sural [51] detect intrusions using fuzzy logic, which combines evidence from a user's current and past behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…The created rule-database is utilized for classification. This data mining method has been applied to network intrusion detection systems [8] and medical systems [9]. GNP can handle a huge database efficiently, and the extracted rules have a form of easy-to-understand.…”
Section: Genetic Network Programing Gnpmentioning
confidence: 99%
“…It has been analyzed that the use of Fuzzy Logic makes the detection process synonym to real world, defining the candidate set on the basis of uncertainty in support and confidence framework [3] while the Genetic Algorithm optimizes the detection process making the intrusion detection effective and optimizing the membership function. Further, these membership functions and patterns are stored for future use [10].…”
Section: Future Opportunitiesmentioning
confidence: 99%