𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

✍ Scribed by Florez G., Bridges S.M., Vaughn R.B.


Year
2004
Tongue
English
Leaves
6
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy association rules that are mined from network audit data as models of "normal behavior. To detect anomalous behavior, wegenerate fuzzy association rules from new audit data and compute the similarity with sets mined from "normal" data. If the similarity values are below a threshold value, an alarm isissued. In this paper we describe an algorithm for computing fuzzy association rules based on Borgelt's prefix trees, modifications to the computation of support and confidence offuzzy rules, a new method for computing the similarity of two fuzzy rule sets, and feature selection and optimization with genetic algorithms. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications.


πŸ“œ SIMILAR VOLUMES


Fuzzy Modeling and Genetic Algorithms fo
✍ Earl Cox πŸ“‚ Library πŸ“… 2005 πŸ› Morgan Kaufmann 🌐 English

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As you'll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all k

Intrusion Detection: A Data Mining Appro
✍ Nandita Sengupta, Jaya Sil πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncert

Extrusion detection: security monitoring
✍ Bejtlich, Richard πŸ“‚ Library πŸ“… 2005;2006 πŸ› Addison-Wesley Professional 🌐 English

<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.

Data Mining Tools for Malware Detection
✍ Mehedy Masud, Latifur Khan, Bhavani Thuraisingham πŸ“‚ Library πŸ“… 2011 πŸ› Auerbach Publications,CRC Press 🌐 English

<P>Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, <STRONG>Data Mining Tools for Malware Detection</STRONG> provides a st

Data Mining Tools for Malware Detection
✍ Mehedy Masud, Latifur Khan, Bhavani Thuraisingham πŸ“‚ Library πŸ“… 2011 πŸ› Auerbach Publications 🌐 English

<p>Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, <strong>Data Mining Tools for Malware Detection</strong> provides a st

Application of Artificial Immune System
πŸ“‚ Library 🌐 English

Intrusion Detection (ID) is one of the most challenging problems in today’s era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune Sy