CFP last date
20 May 2024
Reseach Article

Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm

by Swati Dhopte, N. Z. Tarapore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 14
Year of Publication: 2012
Authors: Swati Dhopte, N. Z. Tarapore
10.5120/8489-2436

Swati Dhopte, N. Z. Tarapore . Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm. International Journal of Computer Applications. 53, 14 ( September 2012), 20-27. DOI=10.5120/8489-2436

@article{ 10.5120/8489-2436,
author = { Swati Dhopte, N. Z. Tarapore },
title = { Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 14 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 20-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number14/8489-2436/ },
doi = { 10.5120/8489-2436 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:05.403923+05:30
%A Swati Dhopte
%A N. Z. Tarapore
%T Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 14
%P 20-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now security is considered as a major issue in networks, since the network has extended dramatically. Therefore, intrusion detection systems have attracted attention, as it has an ability to detect intrusion accesses effectively. These systems identify attacks and react by generating alerts or by blocking the unwanted data/traffic. The proposed system includes fuzzy logic with a data mining method which is a class-association rule mining method based on genetic algorithm. Due to the use of fuzzy logic, the proposed system can deal with mixed type of attributes and also avoid the sharp boundary problem. Genetic algorithm is used to extract many rules which are required for anomaly detection systems. An association-rule- mining method is used to extract a sufficient number of important rules for the user's purpose rather than to extract all the rules meeting the criteria which are useful for misuse detection. Experimental results with KDD99 Cup database from MIT Lincoln Laboratory show that the proposed method provides competitively high detection rates compared with crisp data mining.

References
  1. Mabu S. , Chen C. , Shimada K. , "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming," IEEE Transactions Systems, Man, Cybernetics C, Application and Reviews, volume 41, number 1, pp. 130–139, January 2011.
  2. Hoque M. , Mukit M. and Bikas M. , "An Implementation of Intrusion Detection System using Genetic Algorithm," International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, March 2012.
  3. Lu W. and Traore I. , "Detecting new forms of network intrusion using genetic programming," Computer Intelligence, volume 20, no. 3, pp. 474–494, 2004.
  4. Kaliyamurthie K. , Parameswari D. , Suresh R. , "Intrusion Detection System using Memtic Algorithm Supporting with Genetic and Decision Tree Algorithms," IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012.
  5. Anderson J. , "Computer Security Threat Monitoring and Surveillance," February 26, 1980- revised April 15, 1980.
  6. Denning D. , "An intrusion detection model," IEEE Trans. Software Eng. , vol. 13, no. 2, pp. 222–232, Feb. 1987.
  7. Ektefa M. , Memar S. , "Intrusion Detection Using Data Mining Techniques," IEEE Trans. , 2010.
  8. Reddy E. , Reddy V. , Rajulu P. , "A Study of Intrusion Detection in Data Mining", Proceedings of the World Congress on Engineering 2011 Vol III WCE 2011, July 6 - 8, 2011, London, U. K.
  9. Shetty M. and Shekokar N. , "Data Mining Techniques for Real Time Intrusion Detection Systems," International Journal of Scientific & Engineering Research Volume 3, Issue 4, April 2012.
  10. Lee W. and Stolfo S. , "Data Mining Approaches for Intrusion Detection," Computer Science Department Columbia University.
  11. Mchugh J. , "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory," ACM Transactions on Information and System Security, Vol. 3, No. 4, November 2000, Pages 262–294.
  12. Naidu N. and Dharaskar R. , "An Effective Approach to Network Intrusion Detection System using Genetic Algorithm", International Journal of Computer Applications (0975 - 8887) volume 1 No. 2, 2010.
  13. Bankovic Z. , Stepanovic D. , Bojanic S. , "Improving Network Security using Genetic Algorithm Approach," Computer and Electrical Engineering, pp. 438-451, 2007.
  14. Shanmugam B. and Idris N. , "Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic", Advanced Informatics School (AIS), University Technology Malaysia International Campus, Kuala Lumpur, Malaysia.
  15. Luo J. , "Integrating fuzzy logic with data mining methods for intrusion detection," Master's Thesis, Department of Computer Science, Mississippi State University, Starkville, MS, 1999.
  16. Crosbie M. and Spafford G. , "Applying genetic programming to intrusion detection," presented at the AAAI Fall Symp. Series, AAAI Press, Menlo Park, CA, Tech. Rep. FS-95-01, 1995.
  17. Desheng F. , Zhou S. , Guo P. , "Research on a Distributed Network Intrusion Detection System Based on Association Rule Mining," The 1st International Conference on Information Science and Engineering (ICISE2009).
  18. Barbara, D. , Couto, J. , Jajodia, S. , & Wu, N. , "ADAM: A testbed for exploring the use of data mining in intrusion detection", ACM SIGMOD Record, 30 (4), 15—24, 2001.
  19. Zhang J. , Zulkernine M. , and Haque A. , "Random-forests-based network intrusion detection systems," IEEE Transactions Systems, Man, Cybernetics C, Applications and Reviews, volume 38, no. 5, pp. 649–659, September 2008.
  20. Semaray J. , Edmonds J. , and Papa M. , "Applying data mining of fuzzy association rules to network intrusion detection," presented at the IEEE Workshop Information, United States Military Academy, West Point, NY, 2006.
  21. Abdullah B. , Abd-alghafar I. , "Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System," 13th International Conference on Aerospace Sciences & Aviation Technology, ASAT- 13, 2009.
  22. Helm B. , "Fuzzy Association Rules: An Implementation in R," Master's Thesis, Vienna University of Economics and Business Administration Vienna, 2007.
  23. Gong R. , Zulkernine M. , Abolmaesumi P. , "A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection," Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Dis tributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, IEEE, 2005.
  24. Sathya s. , Ramani R. , Sivaselvi K. , "Discriminant Analysis based Feature Selection in KDD Intrusion Dataset," International Journal of Computer Applications (0975 – 8887), Volume 31– No. 11, October 2011.
  25. Kddcup 1999data [Online]. Available: kdd. ics. uci. edu/ databases/kddcup99/kddcup99 . html.
  26. Florez G. , Bridges S. , Vaughn R. , "An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection", Annual Meeting of The North American Fuzzy Information Processing Society Proceedings, 2002.
  27. NeuroDimension inc. [Online]. Available: http:// www. nd. com/products/genetic/crossover. html
  28. Agrawal R. and Srikant R. , "Fast algorithms for mining association rules," in Proceeding 20th VLDB Conference, Santiago, Chile, pp. 487–499, 1994.
  29. Han J. , Kamber M. , "Data Mining," Morgan Kaufmann Publishers, 2001.
  30. Goldberg D. , "Genetic Algorithm in Search, Optimization and Machine Learning," Reading, MA: Addison-Wesley, 1989.
  31. Koza J. , "Genetic Programming, on the Programming of Computers by Means of Natural Selection. Cambridge," MA: MIT Press, 1992.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Intrusion Detection System (IDS) Genetic Algorithm (GA) Network Security Fuzzy Logic