Amalgamation of IDS Classification with Fuzzy Techniques for Sequential Pattern Mining

نویسندگان

  • Sunita Mahajan
  • Alpa Reshamwala
چکیده

Intrusion detection system has been a powerful weapon to protect networks from attacks and has gained more and more attention. Data mining has been proven as an important method to detect intrusions. Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained importance. Sequential pattern mining, which discovers frequent subsequences as patterns in a sequence database, is useful in discovering audit patterns along with time from network audit databases. Intrusion detection system uses Boolean logic in determining whether or not an intrusion is detected and the use of fuzzy logic has been investigated as an alternative. Fuzzy logic addresses the formal principles of approximate reasoning. It provides a sound foundation to handle imprecision and vagueness as well as mature inference mechanisms using varying degrees of truth. Because boundaries are not always clearly defined, fuzzy logic can be used to identify complex pattern or behavior variations. Accordingly, Chen et al. have proposed a fuzzy time-interval (FTI) sequential pattern mining algorithms, which reveals the time intervals between successive patterns [12][13]. In this paper, we contributed to the ongoing research on FTI sequential pattern mining by proposing an algorithm to detect and classify audit sequential patterns in network traffic data. The paper defines the confidence of the FTI audit sequences, which is not yet defined in the previous researches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Detection of Breast Cancer Progress Using Adaptive Nero Fuzzy Inference System and Data Mining Techniques

Prediction, diagnosis, recovery and recurrence of the breast cancer among the patients are always one of the most important challenges for explorers and scientists. Nowadays by using of the bioinformatics sciences, these challenges can be eliminated by using of the previous information of patients records. In this paper has been used adaptive nero fuzzy inference system and data mining techniqu...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Application of Data Mining in Network Intrusion Detection System

This paper presents a brief review of the application of various Data Mining techniques and their advances in the design, development and application of Intrusion Detection Systems (IDS) for protecting computer and communication networks from intruders. Data mining techniques are used to monitor and analyze large amount of network data & classify these network data into anomalous and normal dat...

متن کامل

A Survey on Intrusion Detection System Using Data Mining Techniques

Nowadays, an increasing number of populations are accessing the Internet for commercial services which is the major cause for attack. Threats are created everyday by an individual or by the organization that attacks the network system. Unusual Malicious activities and unauthorized access are identified by observing the network in Intrusion Detection System. IDS is a passive monitoring system, i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011