On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems

被引:149
|
作者
Elhag, Salma [1 ]
Fernandez, Alberto [2 ]
Bawakid, Abdullah [3 ]
Alshomrani, Saleh [3 ]
Herrera, Francisco [3 ,4 ]
机构
[1] King Abdulaziz Univ, Dept Informat Syst, Jeddah 21413, Saudi Arabia
[2] Univ Jaen, Dept Comp Sci, Jaen, Spain
[3] King Abdulaziz Univ, Fac Comp & Informat Technol North Jeddah, Jeddah 21413, Saudi Arabia
[4] Univ Granada, CITIC UGR Res Ctr Informat & Commun Technol, Dept Comp Sci & Artificial Intelligence, Granada, Spain
关键词
Intrusion Detection Systems; Genetic Fuzzy Systems; Pairwise learning; One-vs-One; Misuse detection; MULTICLASS PROBLEMS; CLASSIFICATION; ALGORITHMS; TAXONOMY; PROPOSAL; DESIGN; MODELS; TRENDS; SET;
D O I
10.1016/j.eswa.2014.08.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security policies of information systems and networks are designed for maintaining the integrity of both the confidentiality and availability of the data for their trusted users. However, a number of malicious users analyze the vulnerabilities of these systems in order to gain unauthorized access or to compromise the quality of service. For this reason, Intrusion Detection Systems have been designed in order to monitor the system and trigger alerts whenever they found a suspicious event. Optimal Intrusion Detection Systems are those that achieve a high attack detection rate together with a small number of false alarms. However, cyber attacks present many different characteristics which make them hard to be properly identified by simple statistical methods. According to this fact, Data Mining techniques, and especially those based in Computational Intelligence, have been used for implementing robust and accuracy Intrusion Detection Systems. In this paper; we consider the use of Genetic Fuzzy Systems within a pairwise learning framework for the development of such a system. The advantages of using this approach are twofold: first, the use of fuzzy sets, and especially linguistic labels, enables a smoother borderline between the concepts, and allows a higher interpretability of the rule set. Second, the divide-and-conquer learning scheme, in which we contrast all possible pair of classes with aims, improves the precision for the rare attack events, as it obtains a better separability between a "normal activity" and the different attack types. The goodness of our methodology is supported by means of a complete experimental study, in which we contrast the quality of our results versus the state-of-the-art of Genetic Fuzzy Systems for intrusion detection and the C4.5 decision tree. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:193 / 202
页数:10
相关论文
共 50 条
  • [21] A fuzzy description logic model for Intrusion Detection Systems
    Baniasadi Z.
    Sanei A.
    Omidi M.R.
    2010 5th International Symposium on Telecommunications, IST 2010, 2010, : 552 - 556
  • [22] Adaptive neuro-fuzzy intrusion detection systems
    Chavan, S
    Shah, K
    Dave, N
    Mukherjee, S
    Abraham, A
    Sanyal, S
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 70 - 74
  • [23] Fuzzy Logic based Network Intrusion Detection Systems
    Johanyak, Zsolt Csaba
    2020 IEEE 18TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2020), 2020, : 15 - 15
  • [24] Improving the effectiveness of intrusion detection systems for hierarchical data
    Yahalom, Ran
    Steren, Alon
    Nameri, Yonatan
    Roytman, Maxim
    Porgador, Angel
    Elovici, Yuval
    KNOWLEDGE-BASED SYSTEMS, 2019, 168 : 59 - 69
  • [25] Improving Intrusion Detection Systems for Wireless Sensor Networks
    Stetsko, Andriy
    Smolka, Tobias
    Matyas, Vashek
    Stehlik, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 343 - 360
  • [26] Improving energy efficiency in distributed intrusion detection systems
    Migliardi, Mauro
    Merlo, Alessio
    JOURNAL OF HIGH SPEED NETWORKS, 2013, 19 (03) : 251 - 264
  • [27] Intrusion detection systems
    IEEE Intelligent Systems and Their Applications, 2001, 16 (01):
  • [28] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [29] Genetic convolutional neural network for intrusion detection systems
    Nguyen, Minh Tuan
    Kim, Kiseon
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 418 - 427
  • [30] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177