Anomaly detection based on fuzzy rules

被引:0
|
作者
Jiao W. [1 ]
Li Q. [2 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
[2] Shandong University, Jinan
关键词
Anomaly detection; Intrusion detection; Network security; Web application;
D O I
10.23940/ijpe.18.02.p19.376385
中图分类号
学科分类号
摘要
Essentially, the fuzzy assert rule library is the fuzzy decision tree. A fuzzy decision tree growth algorithm based on local dynamic optimization is present. Following the idea of the greedy strategy, the algorithm ensures that once a continuous attribute is chosen as a branch node, the membership functions of this attribute after fuzzifying is dynamically optimized. On the other hand, according to fuzzy logic, enhanced Apriori algorithm is present to all the fuzzy frequent item sets composed of fuzzified attributes of multiple events. Then, the fuzzy frequent item sets are transformed into fuzzy association rules that compose the fuzzy association rule library. As for a multiple event sequence, eight different detection algorithms are provided and tested on the same platform. Experiments show that two new algorithms using the fuzzy decision tree and fuzzy association rule library detection models get the highest score. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:376 / 385
页数:9
相关论文
共 50 条
  • [1] A fuzzy rules based approach for performance anomaly detection
    Xu, H
    You, J
    Liu, FY
    2005 IEEE Networking, Sensing and Control Proceedings, 2005, : 44 - 48
  • [2] An Improved Anomaly Detection Method Based on Fuzzy Association Rules
    Yang, Zifen
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 474 - 477
  • [3] An Improved Anomaly Detection Method Based on Fuzzy Association Rules
    Yang, Zifen
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 441 - 447
  • [4] Mining fuzzy associate rules for anomaly detection
    Xiong, P
    Zhu, TQ
    Huang, TS
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 541 - 544
  • [5] Anomaly detection using fuzzy association rules
    Dolores Ruiz, M.
    Martin-Bautista, Maria J.
    Sanchez, Daniel
    Vila, Maria-Amparo
    Delgado, Miguel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 25 - 37
  • [6] Evolving Fuzzy Rules for Anomaly Detection in Data Streams
    Moshtaghi, Masud
    Bezdek, James C.
    Leckie, Christopher
    Karunasekera, Shanika
    Palaniswami, Marimuthu
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2015, 23 (03) : 688 - 700
  • [7] INTERNET ANOMALY DETECTION WITH WEIGHTED FUZZY MATCHING OVER FREQUENT EPISODE RULES
    Chen, Da-Peng
    Zhang, Xiao-Song
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 299 - 302
  • [8] Botnet Detection based on Fuzzy Association Rules
    Lu, Jiazhong
    Lv, Fengmao
    Liu, Quan-Hui
    Zhang, Malu
    Zhang, Xiaosong
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 578 - 584
  • [9] Web Anomaly Detection Based on Frequent Closed Episode Rules
    Wang, Lei
    Cao, Shoufeng
    Wan, Lin
    Wang, Fengyu
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 967 - 972
  • [10] Data relative currency repair and anomaly detection based on rules
    Duan, Xuliang
    Xiao, Zeyan
    Liu, Yuhai
    Li, Zhiyao
    Zhu, Qingsong
    Lang, Songsong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 243