Author:
Xu Yuzhao,Sun Yanjing,Ma Zhanguo,Zhao Hongjie,Wang Yanfen,Lu Nannan, , ,
Abstract
Intrusion detection, as a technology used to monitor abnormal behavior and maintain network security, has attracted many researchers’ attention in recent years. Thereinto, association rule mining is one of the mainstream methods to construct intrusion detection systems (IDS). However, the existing association rule algorithms face the challenges of high false positive rate and low detection rate. Meanwhile, too many rules might lead to the uncertainty increase that affects the performance of IDS. In order to tackle the above problems, a modified genetic network programming (GNP) is proposed for class association rule mining. Specifically, based on the property that node connections in the directed graph structure of GNP can be used to construct attribute associations, we propose to introduce information gain into GNP node selection. The most important attributes are thus selected, and the irrelevant attributes are removed before the rule is extracted. Moreover, not only the uncertainty among the class association rules is alleviated and also time consumption is reduced. The extracted rules can be applied to any classifier without affecting the detection performance. Experiment results based on NSL-KDD and KDDCup99 verify the performance of our proposed algorithm.
Funder
the National Key Research and Development Program of China
National Natural Science Foundation of China
Publisher
Fuji Technology Press Ltd.
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction
Reference51 articles.
1. El-Semary et al., “Applying data mining of fuzzy association rules to network intrusion detection,” 2006 IEEE Information Assurance Workshop, pp. 100-107, 2006.
2. Q. Meng, S. Zheng, and Y. Cai, “Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling,” J. Adv. Comput. Intell. Intell. Inform., Vol.23, No.3, pp. 396-401, 2019.
3. D. E. Denning, “An intrusion-detection model,” IEEE Trans. on Software Engineering, Vol.SE-13, No.2, pp. 222-232, 1987.
4. S. Mohammadi et al., “Cyber intrusion detection by combined feature selection algorithm,” J. of Information Security and Applications, Vol.44, pp. 80-88, 2019.
5. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, Vol.18, No.2, pp. 1153-1176, 2016.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献