We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy associati
FuzzyData Mining and Genetic Algorithms Applied to Intrusion Detection
β Scribed by Bridges S.M., Vaughn R.B.
- Year
- 2000
- Tongue
- English
- Leaves
- 14
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
We are developing a prototype intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components.
π SIMILAR VOLUMES
Intrusion Detection (ID) is one of the most challenging problems in todayβs era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune Sy
<p><p>This is the first book primarily dedicated to clustering using multiobjective genetic algorithms with extensive real-life applications in data mining and bioinformatics. The authors first offer detailed introductions to the relevant techniques β genetic algorithms, multiobjective optimization,
<P>Event mining encompasses techniques for automatically and efficiently extracting valuable knowledge from historical event/log data. The field, therefore, plays an important role in data-driven system management. <STRONG>Event Mining: Algorithms and Applications</STRONG> presents state-of-the-art
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncert