Detection of intrusion using evolutionary soft computing techniques

An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association rules and simple partitioning scheme to handle quantitative data. Fuzzy partitioning scheme found to overcome the problem of vagueness of boundary and association rules are also replaced with fuzzy class association rules. Evolutionary algorithms do global search in order to discover new interesting classification rules. GNP is found better than other evolutionary algorithms due to its structure. This paper describes how evolutionary computing technologies are better to build a classifier with minimum number of class association rules and maximizing accuracy of classified patterns in intrusion detection problem.

[1]  Neil T. Heffernan,et al.  Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems , 2004, Intelligent Tutoring Systems.

[2]  Jinglu Hu,et al.  Association rules mining for handling continuous attributes using genetic network programming and fuzzy membership functions , 2007, SICE Annual Conference 2007.

[3]  K. Shimada,et al.  Self-Adaptive Mechanism in Genetic Network Programming for Mining Association Rules , 2006, 2006 SICE-ICASE International Joint Conference.

[4]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[5]  Jinglu Hu,et al.  Genetic network programming with class association rule acquisition mechanisms from incomplete database , 2007, SICE Annual Conference 2007.

[6]  S. Mabu,et al.  Discovering fuzzy classification rules using Genetic Network Programming , 2008, 2008 SICE Annual Conference.

[7]  Kotaro Hirasawa,et al.  Genetic Network Programming with Acquisition Mechanisms of Association Rules , 2006, J. Adv. Comput. Intell. Intell. Informatics.

[8]  Norbik Bashah Idris,et al.  Novel Attack Detection Using Fuzzy Logic and Data Mining , 2006, Security and Management.

[9]  K. R. Chandran,et al.  Efficient Associative Classification using Genetic Network Programming , 2011 .

[10]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  Shingo Mabu,et al.  Network intrusion detection using fuzzy class association rule mining based on genetic network programming , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Kotaro Hirasawa,et al.  Class Association Rule Mining with Chi-Squared Test Using Genetic Network Programming , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[13]  Wei Lu,et al.  Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..

[14]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[15]  I. Ramesh Babu Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms , 2008 .

[16]  Wang Yunwu Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System , 2009, 2009 International Forum on Information Technology and Applications.

[17]  Shingo Mabu,et al.  Fuzzy classification rule mining based on Genetic Network Programming algorithm , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[18]  Man Hon Wong,et al.  Mining fuzzy association rules in databases , 1998, SGMD.

[19]  Peter J. Angeline,et al.  Adaptive and Self-adaptive Evolutionary Computations , 1995 .

[20]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[21]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[22]  Chunhua Wang,et al.  Intrusion Detection Based on Fuzzy Association Rules , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[23]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[24]  Shingo Mabu,et al.  Online learning of genetic network programming (GNP) , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[25]  Shingo Mabu,et al.  Analysis of fuzzy class association rule mining based on Genetic Network Programming , 2009, 2009 ICCAS-SICE.

[26]  Ramakrishnan Srikant,et al.  Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.

[27]  Shingo Mabu,et al.  Genetic Network Programming for fuzzy association rule-based classification , 2009, 2009 IEEE Congress on Evolutionary Computation.

[28]  Bo-Hyeun Wang,et al.  Automatic rule generation for fuzzy controllers using genetic algorithms: a study on representation scheme and mutation rate , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).

[29]  Vivek K. Kshirsagar,et al.  Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .

[30]  Kotaro Hirasawa,et al.  Comparison between Genetic Network Programming (GNP) and Genetic Programming (GP) , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[31]  Kotaro Hirasawa,et al.  Genetic Network Programming with Acquisition Mechanisms of Association Rules in Dense Database , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[32]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[33]  Zheng Pei,et al.  MINING FUZZY ASSOCIATION RULES FROM DATABASE , 2009 .

[34]  Shingo Mabu,et al.  Association rule mining for continuous attributes using genetic network programming , 2007, GECCO '07.