Title:
|
GNP-BASED FUZZY CLASS-ASSOCIATION-RULE MINING WITH SUB-ATTRIBUTE UTILIZATION |
Author(s):
|
Abhishek Ranjan, Rajalakshmi Selvaraj, Venu Madhav Kuthadi |
ISBN:
|
978-972-8939-68-7 |
Editors:
|
Miguel Baptista Nunes, Pedro Isaías and Philip Powell |
Year:
|
2012 |
Edition:
|
Single |
Keywords:
|
Genetic network programming (GNP), tuples, Centroids , Fuzzy Class-Association-Rule |
Type:
|
Full Paper |
First Page:
|
11 |
Last Page:
|
17 |
Language:
|
English |
Cover:
|
|
Full Contents:
|
click to dowload
|
Paper Abstract:
|
Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose a novel fuzzy class-association rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. An incomplete database includes missing data in some tuples; however, the proposed method can extract important rules using these tuples. The GNP-Based Fuzzy Class-Association-Rule Mining performs in existing data only it cannot newly added Intrusion. Therefore we present Intrusion Detection Systems based on analyzing process traces. It also include following steps in GNP-Based Fuzzy Class-Association-Rule Process data model as a mathematical representation of normal behavior Improving the process data model improves the model of normal behavior. It should represent the underlying truth of normalcy of the data Uses cluster centers or centroids Uses distances away from the centroids Convert the Data to the Training Data |
|
|
|
|