2012
DOI: 10.5120/8489-2436
|View full text |Cite
|
Sign up to set email alerts
|

Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm

Abstract: Now security is considered as a major issue in networks, since the network has extended dramatically. Therefore, intrusion detection systems have attracted attention, as it has an ability to detect intrusion accesses effectively. These systems identify attacks and react by generating alerts or by blocking the unwanted data/traffic. The proposed system includes fuzzy logic with a data mining method which is a class-association rule mining method based on genetic algorithm. Due to the use of fuzzy logic, the pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…In this case, the requests are partial HTTP requests. The attack lasts until all available sockets are reserved by the HTTP requests, causing the server to freeze in response to any legitimate connection [24]. The final attack is the Slowpost attack.…”
Section: Snmp-mib Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the requests are partial HTTP requests. The attack lasts until all available sockets are reserved by the HTTP requests, causing the server to freeze in response to any legitimate connection [24]. The final attack is the Slowpost attack.…”
Section: Snmp-mib Datasetmentioning
confidence: 99%
“…The rapid growth of intrusion techniques poses a challenge for binarydecision based detection approaches. The crisp set [24] is not suitable for expressing the level of attack, which could improve the expression capabilities of the modern intrusion techniques. The fuzzy system also provide the required boundary smoothing because it can also deal with approximation, not only with precise values.…”
Section: Fuzzy Rule Interpolation (Fri)mentioning
confidence: 99%
“…where s * is the support degree of a new rule formed by genetic operation; s min is the pre-given support threshold. If fit(R) > 0, this rule will be kept into the next generation; if fit(R) < 0, this rule will be eliminated in inheritance [20]. The main parameters of the genetic algorithm are set as follows, population size: 100, evolution algebra: 200.…”
Section: ) Net Income Of the Pessmentioning
confidence: 99%
“…The matrix A 1 is substituted into (20) to solve the eigenvector corresponding to the maximum eigenvalue λ = max(x), the weight sequence of the index {WA i } 1×4 (i = 1, 2, . .…”
Section: B Overall Economic Evaluation Of the Pess Based On Entropy Weight-ahpmentioning
confidence: 99%
“…If compromised, appropriate corrective actions were taken using negative information sharing and independent trust-based decision making. Dhopte and Tarapore (2012) worked with fuzzy class association rule mining based on genetic algorithm to design an intrusion detection system which proved to be more accurate when compared with the use of Cross Industry Standard Process Data Mining (CRISP-DM) Approach. The system which could be applied to both misuse and anomaly intrusion detection used the KDD '99 cup dataset to train and test the system while fuzzy set theory was combined with association rule mining algorithm to extract the rules with attributes of continuous value.…”
Section: Introductionmentioning
confidence: 99%