Intrusion Detection Using Fuzzy Stochastic Local Search Classifier

This paper proposes a stochastic local search classifier combined with the fuzzy logic concepts for intrusion detection. The proposed classifier works on knowledge base modeled as a fuzzy rule "if-then" and improved by using a stochastic local search. The method is tested on the Benchmark KDD'99 intrusion dataset and compared with other existing techniques for intrusion detection. The results are encouraging and demonstrate the benefit of the proposed approach.

[1]  Habiba Drias,et al.  Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents , 2006, 2006 International Conference on Dependability of Computer Systems.

[2]  Susan C. Lee,et al.  Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[3]  Zied Elouedi,et al.  Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.

[4]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[5]  A. Anou,et al.  RETRACTED: A Bayesian Networks in Intrusion Detection Systems , 2007 .

[6]  R. Jagannathan,et al.  A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[7]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  C. Lucas,et al.  Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..

[9]  D. Kibler,et al.  Instance-based learning algorithms , 2004, Machine Learning.

[10]  Hisao Ishibuchi,et al.  Techniques and Applications of Genetic Algorithm-Based Methods for Designing Compact Fuzzy Classification Systems , 1999 .

[11]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[12]  Anupam Joshi,et al.  Fuzzy clustering for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[13]  Pat Langley,et al.  Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.

[14]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[15]  Gunar E. Liepins,et al.  Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[16]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.