Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection

Jacinth Salome*, Ramya Ravishankar**
*,** Lecturer ,Velammal Engg College ,Red Hills Road ,Puzhal ,Chennai
Periodicity:April - June'2007
DOI : https://doi.org/10.26634/jse.1.4.731

Abstract

A prototype of  intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components.

Keywords

How to Cite this Article?

Jacinth Salome and Ramya Ravishankar (2007). Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. i-manager’s Journal on Software Engineering, 1(4), 23-30. https://doi.org/10.26634/jse.1.4.731

References

[ I ]. Allen, J. , Alon Christie, Willimo Fithen, John McHugh, Jed Picket, Ed Stoner. 2000. State of the Practice of Intrusion Detection Technolog!es. Carnegie Mellon Software Engineering Instifute. {Downloaded from http://sei,cmu.edu/publications/documents/99.reports/ 99trO28abstract.html).
[2]. Tong, H. , K. Chen, ond S. Lu. 1990. Adaptive real-time anomaly detection using inductively generated sequenfial patterns. In Proceedings of 1990 IEEE computer society symposium on research in security and privacy held in Oakland, Cal!fomia, May 7-9, 1990, by IEEE Computer Society, 278-84. Los Alamitos, CA: IEEE Computer Society Press.
[3]. Debor, H., M. Becker, ond D. Siboni. 1992. A neural network component for an intrusion detection system. In Proceedings of 1992 IEEE computer society symposium on research in security and privacy held in Oakland, California, May 4-6,1992, by IEEE Computer Society, 240- 50. Los Alamitos, CA: IEEE Computer Society Press.
[4]. Mann|lo, H., ond H. Toivonen. 1996. Discovering generalized episodes using minimal occurrences. In Proceed!ngs of the second !nternatlonal conference on knowledge discovery and data mining held in Portland, Oregon, August, 1996 , by AAAI Press, I 46-5 I . {Downloaded from http://www.cs,Helsinki.Fl/research /fdk/ datamining/pubs on 19 February I 999 ,)
[5]. A Multi-Dimensional Approach to the Study of Human- Information Interaction: A Case Study of Collaborative Information Retrieval by R. Fidel, A.M~ Pejtersen, B. CleaI, and H. Bruce {2004).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.