Skip to main content

A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Computer and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 380))

Abstract

Today in the era of ICT, security of data and services on the WWW has become the most important issue for web service providers. Loopholes in the security systems of WWW may break the integrity, reliability, and availability of data and services. Today, intrusion detection systems based on data mining is the best security framework for the Internet. In this paper a novel intrusion detection system is proposed which is based on the fuzzy min-max neural network and the genetic algorithm. The proposed model is trained using fuzzy min-max neural network and the learning system is optimized by application of genetic algorithm. The developed system is tested on the KDD Cup dataset. The parameters classification accuracy and classification error were used as a final performance evaluator of the learning process. The experimental results show that the proposed model gives superior performance over other existing frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  2. Yang, H., Li, T., Hu, X., Wang, F., Zou, Y.: A survey of artificial immune system based intrusion detection. Sci. World J. 11, 1–5 (2014)

    Google Scholar 

  3. Tong, X., Wang, Z., Haining, Y.: A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Comput. Phys. Commun. 180(10), 1795–1801 (2009)

    Article  Google Scholar 

  4. Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225–6232 (2010)

    Article  Google Scholar 

  5. Lei, J.Z., Ghorbani, A.A.: Improved competitive learning neural networks for network intrusion and fraud detection. Neurocomputing 75(1), 135–145 (2012)

    Article  Google Scholar 

  6. Shun, J., Malki, H.A.: Network intrusion detection system using neural networks. In: Fourth International Conference on Natural Computation, 2008, ICNC’08, vol. 5, pp. 242–246. IEEE (2008)

    Google Scholar 

  7. Sarasamma, S.T., Zhu, Q.A., Huff, J.: Hierarchical Kohonenen net for anomaly detection in network security. IEEE Trans. Syst. Man Cybern. Part B: Cybern. 35(2), 302–312 (2005)

    Article  Google Scholar 

  8. Linda, O., Vollmer, T., Manic, M.: Neural network based intrusion detection system for critical infrastructures. In: International Joint Conference on Neural Networks, 2009, IJCNN 2009, pp. 1827–1834. IEEE (2009)

    Google Scholar 

  9. Joo, D., Hong, T., Han, I.: The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Syst. Appl. 25(1), 69–75 (2003)

    Article  Google Scholar 

  10. Zhou, Z.H., Jiang, Y.: NeC4.5: neural ensemble based C4.5. IEEE Trans. Knowl. Data Eng. 16(6), 770–773 (2004)

    Google Scholar 

  11. Simpson, P.K.: Fuzzy min-max neural networks. I. Classification. IEEE Trans. Neural Netw. 3(5), 776–786 (1992)

    Google Scholar 

  12. Freitas, A.A.: Evolutionary algorithms for data mining. In: Data Mining and Knowledge Discovery Handbook, pp. 435–467. Springer, New York (2005)

    Google Scholar 

  13. Cup, K.D.D.: Dataset (2009). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  14. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10–18 (2009)

    Article  Google Scholar 

  15. Pfahringer, B.: Winning the KDD99 classification cup: bagged boosting. ACM SIGKDD Explor. Newslett. 1(2), 65–66 (2000)

    Google Scholar 

  16. Levin, I.: KDD-99 classifier learning contest: LLSoft’s results overview. SIGKDD Explor. 1(2), 67–75 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrashekhar Azad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Azad, C., Jha, V.K. (2016). A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2523-2_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2522-5

  • Online ISBN: 978-81-322-2523-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics