Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Publish Year: 1393
نوع سند: مقاله ژورنالی
زبان: English
View: 104

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJFS-11-3_006

تاریخ نمایه سازی: 31 خرداد 1401

Abstract:

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a subset of system requirements. There are many non-functional requirements for an applicable and practical IDS. The process should be online, incremental and adaptive to ever changing behaviors of normal users and attackers. Moreover providing comprehensive and interactive IDS could both, enhance the performance of the system and extend the knowledge of domain experts.In this paper, we propose a fuzzy rule-based classification system using a hierarchical rule learning method. In each stage of the hierarchy, a set of rules with certain length of antecedent are investigated. A novel rule weighting method, based on the entropy measure, determines the appropriateness of each rule. The experimental results on KDD۹۹ intrusion detection dataset show the effectiveness of the proposed method in tackling the tradeoff between accuracy and comprehensibility of fuzzy rule-based systems. Although the dimension of antecedents is not limited, the resultant rule-base contains a small number of complex rules, which are essential to reach the desired accuracy.

Authors

Mohammad Reza Moosavi

Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran

Mahsa Fazaeli Javan

Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran

Mohammad Hadi Sadreddini

Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran

Mansoor Zolghadri Jahromi

Department of Computer Science and Eng. and IT, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • bibitem{ref۵۵} R. Agarwal and M. V. Joshi, {it PNrule: a ...
  • bibitem{ref۴۶} A. Ahmad and L. Dey, {it A k-means type ...
  • bibitem{ref۲} R. Bace and P. Mell, {it Intrusion detection systems. ...
  • bibitem{ref۲۷} M. Behdad, L. Barone, T. French and M. Bennamoun, ...
  • bibitem{ref۷} E. Biermann, E. Cloete and L. M. Venter, {it ...
  • bibitem{ref۲۴} S. M. Bridges and R. B. Vaughn, {it Fuzzy ...
  • bibitem{ref۳} D. J. Brown, B. Suckow and T. Wang, {it ...
  • bibitem{ref۵} V. Chandola, A. Banerjee and V. Kumar, {it Anomaly ...
  • bibitem{ref۴۸} C. H. Cheng, A. W. Fu, Y. Zhang and ...
  • bibitem{ref۴۱} T. S. Chou, K. K. Yen and J. Luo, ...
  • bibitem{ref۳۲} O. Cord'{o}n, M. J. del Jesus and F. Herrera, ...
  • bibitem{ref۵۶} H. Dam, K. Shafi and H. Abbass, {it Can ...
  • bibitem{ref۲۶} P. Dixon, D. Corne and M. Oates, {it A ...
  • bibitem{ref۳۸} C. Elkan, {it Results of the KDD'۹۹ classifier learning}, ...
  • bibitem{ref۵۹} S. Ghodratnama, M. R. Moosavi, M. Taheri and M. ...
  • bibitem{ref۱} G. Giacinto, F. Roli and L. Didaci, {it A ...
  • bibitem{ref۲۹} A. Gonzalez, R. Perez and J. L. Verdegay, {it ...
  • bibitem{ref۳۰} A. Gonzalez and R. Perez, {it SLAVE: a genetic ...
  • bibitem{newref۵۴} A. Gonzalez and R. Perez, {it Completeness and consistency ...
  • bibitem{ref۱۳} S. J. Han and S. B. Cho, {it Detecting ...
  • bibitem{ref۵۲} J. Han, M. Kamber and J. Pei, {it Data ...
  • bibitem{ref۳۷} S. J. Horng, M. Y. Su, Y. H. Chen, ...
  • bibitem{ref۲۱} H. H. Hosmer, {it Security is fuzzy!: applying the ...
  • bibitem{ref۲۰} K. Hwang, M. Cai, Y. Chen and M. Qin, ...
  • bibitem{ref۳۴} H. Ishibuchi and T. Nakashima, {it Effect of rule ...
  • bibitem{ref۳۵} H. Ishibuchi, T. Nakashima and T. Murata, {it Performance ...
  • bibitem{ref۳۶} H. Ishibuchi and T. Yamamoto, {it Fuzzy rule selection ...
  • bibitem{newref۵۳} H. Ishibuchi and T. Yamamoto, {it Comparison of heuristic ...
  • bibitem{ref۳۱} M. Z. Jahromi and M. R. Moosavi, {it Designing ...
  • bibitem{newref۳۹_۱} H. G. Kayacik, A. Nur Zincir-Heywood and M. I. ...
  • bibitem{ref۴۰} KDD Cup ۱۹۹۹ Intrusion detection dataset, http://kdd.ics.uci.edu / databases ...
  • bibitem{ref۴} T. D. Lane, {it Machine learning techniques for the ...
  • bibitem{ref۱۲} H. Lee, J. Song and D. Park, {it Intrusion ...
  • bibitem{ref۲۲} K. C. Lee and L. Mikhailov, {it Intelligent Intrusion ...
  • bibitem{ref۵۴} I. Levin and H. marganit Street, {it KDD-۹۹ classifier ...
  • bibitem{ref۳۹} R. P. Lippmann, J. W. Haines, D. J. Fried, ...
  • bibitem{ref۴۲} R. P. Lippmann, D. J. Fried, I. Graf, J. ...
  • bibitem{ref۱۰} A. Mitrokotsa and C. Dimitrakakis, {it Ad Hoc Networks ...
  • bibitem{ref۸} M. R. Moosavi, M. Zolghadri Jahromi, S. Ghodratnama, M. ...
  • bibitem{ref۵۰} M. R. Moosavi, M. Fazaeli Javan, M. Zolghadri Jahromi ...
  • bibitem{ref۱۱} T. Ozyer, R. Alhajj and K. Barker, {it Intrusion ...
  • bibitem{ref۱۹} Z. S. Pan, S. Chen, G. B. Hu and ...
  • bibitem{ref۶} M. Panda, A. Abraham, S. Das and M. R. ...
  • bibitem{ref۱۴} A. Patcha and J. min Park, {it An overview ...
  • bibitem{ref۴۷} L. Peng and J. Zhang, {it An entropy weighting ...
  • bibitem{ref۱۸} B. Pfahringer, {it Winning the KDD۹۹ classification cup: bagged ...
  • bibitem{ref۹} P. E. Proctor,{it Practical intrusion detection handbook}, Prentice Hall ...
  • bibitem{ref۴۴} J. R. Quinlan, {it C۴.۵: programs for machine learning}, ...
  • bibitem{ref۴۳} M. Sabhnani and G. Serpen, {it Why machine learning ...
  • bibitem{ref۲۳} H. Schumacher and S. Ghosh, {it A fundamental framework ...
  • bibitem{ref۲۵} K. Shafi and H. A. Abbass, {it An adaptive ...
  • bibitem{ref۵۷} K. Shafi, T. Kovacs, H. Abbass and W. Zhu, ...
  • bibitem{ref۵۱} C. E. Shannon and W. Weaver, {it The mathematical ...
  • bibitem{ref۴۵} S. S. Sivatha Sindhu, S. Geetha and A. Kannan, ...
  • bibitem{ref۵۳} M. Tavallaee, E. Bagheri, W. Lu and A. A. ...
  • bibitem{ref۲۸} A. N. Toosi and M. Kahani, {it A new ...
  • bibitem{ref۱۵} C. H. Tsang, S. Kwong and H. Wang, {it ...
  • bibitem{ref۵۸} S. X. Wu and W. Banzhaf, {it The use ...
  • bibitem{ref۱۶} C. Xiang, M. Y. Chong and H. L. Zhu, ...
  • bibitem{ref۱۷} C. Xiang, P. C. P. C. Yong and L. ...
  • bibitem{ref۴۹} J. Yao, M. Dash, S. S. Tan and H. ...
  • bibitem{ref۳۳} M. J. Zolghadri and E. G. Mansoori, {it Weighting ...
  • نمایش کامل مراجع