Anomaly detection based on fuzzy rules

被引:0
|
作者
Jiao W. [1 ]
Li Q. [2 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
[2] Shandong University, Jinan
关键词
Anomaly detection; Intrusion detection; Network security; Web application;
D O I
10.23940/ijpe.18.02.p19.376385
中图分类号
学科分类号
摘要
Essentially, the fuzzy assert rule library is the fuzzy decision tree. A fuzzy decision tree growth algorithm based on local dynamic optimization is present. Following the idea of the greedy strategy, the algorithm ensures that once a continuous attribute is chosen as a branch node, the membership functions of this attribute after fuzzifying is dynamically optimized. On the other hand, according to fuzzy logic, enhanced Apriori algorithm is present to all the fuzzy frequent item sets composed of fuzzified attributes of multiple events. Then, the fuzzy frequent item sets are transformed into fuzzy association rules that compose the fuzzy association rule library. As for a multiple event sequence, eight different detection algorithms are provided and tested on the same platform. Experiments show that two new algorithms using the fuzzy decision tree and fuzzy association rule library detection models get the highest score. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:376 / 385
页数:9
相关论文
共 50 条
  • [21] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86
  • [22] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [23] Fuzzy Clustering Based Anomaly Detection for Updating Intrusion Detection Signature Files
    Padath, Anish Abraham
    Endicott-Popovsky, Barbara
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 462 - 468
  • [24] Detection of Fuzzy Association Rules by Fuzzy Transforms
    Di Martino, Ferdinando
    Sessa, Salvatore
    ADVANCES IN FUZZY SYSTEMS, 2012, 2012
  • [25] Intrusion Detection Based on Immune Principles and Fuzzy Association Rules
    Zhang Lei
    Meng Lingrui
    Hou Chunjie
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 31 - 35
  • [26] Frequent episode rules for Internet anomaly detection
    Qin, M
    Hwang, K
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 161 - 168
  • [27] Anomaly behavior detection and reliability assessment of control systems based on association rules
    Jie, Xinchun
    Wang, Haikuan
    Fei, Minrui
    Du, Dajun
    Sun, Qing
    Yang, T. C.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 : 90 - 99
  • [28] FADS: A fuzzy anomaly detection system
    Li, Dan
    Wang, Kefei
    Deogun, Jitender S.
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 4062 : 792 - 798
  • [29] A Fuzzy Measure for Intrusion and Anomaly Detection
    Aljawarneh, Shadi A.
    RadhaKrishna, V.
    Kumar, G. Rajesh
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [30] ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency
    Cai, Jun
    Wei, Zeheng
    Luo, Jianzhen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) : 10647 - 10656