Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As you'll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all k
An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection
β Scribed by Florez G., Bridges S.M., Vaughn R.B.
- Year
- 2004
- Tongue
- English
- Leaves
- 6
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy association rules that are mined from network audit data as models of "normal behavior. To detect anomalous behavior, wegenerate fuzzy association rules from new audit data and compute the similarity with sets mined from "normal" data. If the similarity values are below a threshold value, an alarm isissued. In this paper we describe an algorithm for computing fuzzy association rules based on Borgelt's prefix trees, modifications to the computation of support and confidence offuzzy rules, a new method for computing the similarity of two fuzzy rule sets, and feature selection and optimization with genetic algorithms. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications.
π SIMILAR VOLUMES
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncert
<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.
<P>Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, <STRONG>Data Mining Tools for Malware Detection</STRONG> provides a st
<p>Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, <strong>Data Mining Tools for Malware Detection</strong> provides a st
Intrusion Detection (ID) is one of the most challenging problems in todayβs era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune Sy