2007
DOI: 10.1016/j.patcog.2006.12.009
|View full text |Cite
|
Sign up to set email alerts
|

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
89
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 199 publications
(90 citation statements)
references
References 24 publications
0
89
0
1
Order By: Relevance
“…By using the covert channel, the attacker is able to install files from the victim machine and run UNIX commands remotely [26]. The total number of U2R attacks is 228 in [2], [7], [8], [12], [39]- [43], where the http-tunnel attack is considered as a U2R attack. In this study, the http-tunnel attack is taken as a R2L attack, and the number of U2R attacks is 70.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…By using the covert channel, the attacker is able to install files from the victim machine and run UNIX commands remotely [26]. The total number of U2R attacks is 228 in [2], [7], [8], [12], [39]- [43], where the http-tunnel attack is considered as a U2R attack. In this study, the http-tunnel attack is taken as a R2L attack, and the number of U2R attacks is 70.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
“…As performance metrics, The Detection Rates (DRs), Accuracy, and False Alarm Rate (FAR), which are commonly used in IDS related papers [2], [7], [8], [37], are calculated. (14), (15), and (16) describe the DR, FAR, and Accuracy, respectively.…”
Section: Evaluation Criteriamentioning
confidence: 99%
“…Tsang et al [73] proposed a fuzzy rule-based system for intrusion detection, which is evolved from an agent-based evolutionary framework and multiobjective optimization. The proposed system can also act as a genetic feature selection wrapper to search for an optimal feature subset for dimensionality reduction.…”
Section: Recent Applications Of Evolutionary Fuzzy Systems In Practicementioning
confidence: 99%
“…The rules and patterns are useful to identifying intrusions in test data. Data mining [9] techniques such as decision trees [13] , genetic fuzzy rules [11] , neural networks [12] , support vector machine, principal component analysis [10] , naïve Bayesian classifiers and many other feature reduction [14] algorithms have been used widely to determine the network logs and to catch intrusion related information to get better correctness of IDS. The signature based IDS detects attacks on the known attack signature type.…”
Section: Introductionmentioning
confidence: 99%