Skip to main content

Intrusion Detection Based on Immune Principles and Fuzzy Association Rules

  • Conference paper
  • 3302 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 180))

Abstract

In this paper, a new intrusion detection method based on immune principles and fuzzy association rules is proposed. The proposed method uses fuzzy association rules for building fuzzy classifiers, which is also the detection engine of the intrusion detection system. A novel immune-inspired algorithm is proposed for mining fuzzy association rule set, in which the fuzzy sets corresponding to each attribute and the final fuzzy rule set can be directly extracted from a given data set. The KDD-99 dataset is used to evaluate the performance of the proposed algorithm and compared with other relevant intrusion detection methods. The results show the detection performances of the proposed algorithm are comparable with other relevant intrusion detection systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120–132 (1999)

    Google Scholar 

  2. Florez, G., Bridges, S.M., Vaughn, R.B.: An improved algorithm for fuzzy data mining for intrusion detection. In: Proceedings of the North American Fuzzy Information Processing Society Conference NAFIPS, New Orleans, LA, pp. 27–29 (2002)

    Google Scholar 

  3. Tajbakhsh, A.: Design and implementation of an Intrusion Detection Systems using data mining techniques. M.Sc. Thesis. Amirkabir University of Technology (2006)

    Google Scholar 

  4. Saniee, A., Habibi, M.J., Lucas, C.: Intrusion detection using a fuzzy genetics-based learning algorithm. Journal of Network and Computer Applications 30, 414–428 (2007)

    Article  Google Scholar 

  5. Saniee, M., Mohamadi, H., Habibi, J.: Design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Expert Systems with Applications 38, 7067–7075 (2011)

    Article  Google Scholar 

  6. Ozyer, T., Alhajj, R., Barker, K.: Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications 30, 99–113 (2007)

    Article  Google Scholar 

  7. Zhang, L., Li, R.: An Algorithm for Mining Fuzzy Association Rules Based on Immune Principles. In: Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, pp. 1285–1289 (2007)

    Google Scholar 

  8. Stolfo, S.J., et al.: KDD (1999), http://www.kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  9. Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: On dataset biases in a learning system with minimum priori information for intrusion detection. In: Proceedings of the 2nd Annual Conference on Communication Networks and Services Research, pp. 181–189 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lei, Z., Lingrui, M., Chunjie, H. (2013). Intrusion Detection Based on Immune Principles and Fuzzy Association Rules. In: Du, Z. (eds) Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing, vol 180. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31656-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31656-2_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31655-5

  • Online ISBN: 978-3-642-31656-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics