Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study

There is no standard solution we can use to completely protect against computer network intrusion. Every solution has its advantages and drawbacks. Soft computing is considered as a promising paradigm to cope with the dynamic evolution of networks. In previous works, we presented two soft computing approaches of intrusion detection. The first one is based on the neuro-fuzzy and the second one is based on the genetic fuzzy one. In this work, we elaborate an empirical comparative study to highlight the benefits of each method in intrusion detection and exploit their complementarities to enhance the detection rate of all types of attacks as well as decrease the false positives rate.

[1]  Ouajdi Korbaa,et al.  A Genetic-Fuzzy Classification Approach to Improve High-Dimensional Intrusion Detection System , 2016, ISDA.

[2]  Hamid Mohamadi,et al.  Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..

[3]  Sushma Jain,et al.  Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks , 2014, ISI.

[4]  Santosh Kumar Das,et al.  On Soft Computing Techniques in Various Areas , 2013 .

[5]  Sam Kwong,et al.  Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.

[6]  Francisco Herrera,et al.  On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..

[7]  Pratibha Soni,et al.  An Intrusion Detection System Based on KDD -99 Data using Data Mining Techniques and Feature Selection , 2014 .

[8]  Jesús Alcalá-Fdez,et al.  A Fuzzy Association Rule-Based Classification Model for High-Dimensional Problems With Genetic Rule Selection and Lateral Tuning , 2011, IEEE Transactions on Fuzzy Systems.

[9]  Naruemon Wattanapongsakorn,et al.  Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[10]  Rudolf Kruse,et al.  Obtaining interpretable fuzzy classification rules from medical data , 1999, Artif. Intell. Medicine.

[11]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[12]  Jesús Alcalá-Fdez,et al.  A Proposal for the Genetic Lateral Tuning of Linguistic Fuzzy Systems and Its Interaction With Rule Selection , 2007, IEEE Transactions on Fuzzy Systems.

[13]  Ouajdi Korbaa,et al.  Intrusion detection based on Neuro-Fuzzy classification , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[14]  R. Monsefi,et al.  Network intrusion detection based on neuro-fuzzy classification , 2006, 2006 International Conference on Computing & Informatics.

[15]  Tansel Özyer,et al.  Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..

[16]  N. Wattanapongsakorn,et al.  Real-time intrusion detection with fuzzy genetic algorithm , 2013, 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[17]  B. Fei,et al.  Binary tree of SVM: a new fast multiclass training and classification algorithm , 2006, IEEE Transactions on Neural Networks.