Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 321)

Abstract

With the drastic increase in internet usage, various categories of attacks have also evolved. Conventional intrusion detection techniques to counter these attacks have failed and thus substantial systems are needed to eliminate these attacks before they inflict huge damage. With the ability of computational intelligence systems to adapt, exhibit fault tolerance, high computational speed and error resilience against noisy information, a hybrid genetic fuzzy rule based inference engine has been designed in this paper. The fuzzy logic constructs precise and flexible patterns while the genetic algorithm based on evolutionary computation helps in attaining an optimal solution, thus their collaboration will increase the robustness of intrusion detection system. The proposed network intrusion detection system will be able to classify normal behavior as well as anomalies in the network. Detailed analysis has been done on DARPA-KDD99 dataset to specify the behavior of each connection.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Luger, G., Maccabe, A., Servilla, M.: The architecture of a network-level intrusion detection system. Department of Computer Science. College of Engineering, University of New Mexico (1990)Google Scholar
  2. 2.
    SANS Institute, Intrusion Detection Systems: Definition, Need and Challenges. SANS Institute (2001), http://www.sans.org/reading_room/whitepapers/detection/intrusion-detection-systems-definition-challenges_343
  3. 3.
    Ishibuchi, H., Yamamoto, T.: Fuzzy Rule Selection By Data Mining Criteria And Genetic Algorithms. In: GECCO, pp. 399–406 (July 2002)Google Scholar
  4. 4.
    Ishibuchi, H., Yamamoto, T.: Comparison of heuristic criteria for fuzzy rule selection in classification problems. Fuzzy Optimization and Decision Making 3(2), 119–139 (2004)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Nakashima, T., Ghosh, A.: Classification confidence of fuzzy rule-based classifiersGoogle Scholar
  6. 6.
    Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering (2), 222–232 (1987)Google Scholar
  7. 7.
    Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8), 805–822 (1999)CrossRefGoogle Scholar
  8. 8.
    Herrera, F., Magdalena, L.: Genetic fuzzy systems: A tutorial. Tatra Mt. Math. Publ. (Slovakia) 13, 93–121 (1997)Google Scholar
  9. 9.
    Middlemiss, M.J., Dick, G.: Weighted feature extraction using a genetic algorithm for intrusion detection. In: The 2003 Congress on Evolutionary Computation, CEC 2003, vol. 3, pp. 1669–1675. IEEE (December 2003)Google Scholar
  10. 10.
    Liao, Y., Vemuri, V.R.: Use of K-nearest neighbor classifier for intrusion detection. Computers & Security 21(5), 439–448 (2002)CrossRefGoogle Scholar
  11. 11.
    Lee, C.H., Shin, S.W., Chung, J.W.: Network intrusion detection through genetic feature selection. In: Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, pp. 109–114. IEEE (June 2006)Google Scholar
  12. 12.
    Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R.: Feature selection based on rough sets and particle swarm optimization. Pattern Recognition Letters 28(4), 459–471 (2007)CrossRefGoogle Scholar
  13. 13.
    Stein, G., Chen, B., Wu, A.S., Hua, K.A.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, vol. 2, pp. 136–141. ACM (March 2005)Google Scholar
  14. 14.
    Mukkamala, S., Sung, A.H.: Feature ranking and selection for intrusion detection systems using support vector machines. In: Proceedings of the Second Digital Forensic Research Workshop (August 2002)Google Scholar
  15. 15.
    Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702–1707. IEEE (2002)Google Scholar
  16. 16.
    Hofmann, A., Horeis, T., Sick, B.: Feature selection for intrusion detection: an evolutionary wrapper approach. In: Proceeding of the 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 1563–1568. IEEE (July 2004)Google Scholar
  17. 17.
    Lu, W., Traore, I.: A new evolutionary algorithm for determining the optimal number of clusters. In: 2005 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, International Conference on Computational Intelligence for Modeling, Control and Automation, vol. 1, pp. 648–653. IEEE (November 2005)Google Scholar
  18. 18.
    Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, vol. 6(3), pp. 321–323. IEEE Computer Press, New York (2002)Google Scholar
  19. 19.
    Abadeh, M.S., Mohamadi, H., Habibi, J.: Design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Expert Systems with Applications 38(6), 7067–7075 (2011)CrossRefGoogle Scholar
  20. 20.
    Berlanga, F.J., Rivera, A.J., del Jesús, M.J., Herrera, F.: GP-COACH: Genetic Programming-based learning of COmpact and ACcurate fuzzy rule-based classification systems for High-dimensional problems. Information Sciences 180(8), 1183–1200 (2010)CrossRefGoogle Scholar
  21. 21.
    Aydogan, E.K., Karaoglan, I., Pardalos, P.M.: hGA: Hybrid genetic algorithm in fuzzy rule-based classification systems for high-dimensional problems. Applied Soft Computing 12(2), 800–806 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Thapar UniversityPatialaIndia

Personalised recommendations