On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems

Expert Systems with Applications - Tập 42 - Trang 193-202 - 2015
Salma Elhag1, Alberto Fernández2, Abdullah Bawakid3, Saleh Alshomrani3, Francisco Herrera3,4
1Department of Information Systems, King Abdulaziz University (KAU), Jeddah, Saudi Arabia
2Department of Computer Science, University of Jaén, Jaén, Spain
3Faculty of Computing and Information Technology - North Jeddah, King Abdulaziz University (KAU), Jeddah, Saudi Arabia
4Department of Computer Science and Artificial Intelligence, CITIC-UGR (Research Center on Information and Communications Technology), University of Granada, Granada, Spain

Tài liệu tham khảo

Abadeh, 2007, Intrusion detection using a fuzzy genetics-based learning algorithm, Journal of Network and Computer Applications, 30, 414, 10.1016/j.jnca.2005.05.002 Abadeh, 2011, Design and analysis of genetic fuzzy systems for intrusion detection in computer networks, Expert Systems with Applications, 38, 7067, 10.1016/j.eswa.2010.12.006 Alcalá;-Fdez, 2009, KEEL: A software tool to assess evolutionary algorithms for data mining problems, Soft Computing, 13, 307, 10.1007/s00500-008-0323-y Alcala, 2007, A proposal for the genetic lateral tuning of linguistic fuzzy systems and its interaction with rule selection, IEEE Transactions on Fuzzy Systems, 15, 616, 10.1109/TFUZZ.2006.889880 Alcalá-Fdez, 2011, A fuzzy association rule-based classification model for high-dimensional problems with genetic rule selection and lateral tuning, IEEE Transactions on Fuzzy Systems, 19, 857, 10.1109/TFUZZ.2011.2147794 Alcalá, 2012, Special issue on evolutionary fuzzy systems, International Journal Of Computational Intelligence Systems, 5, 209, 10.1080/18756891.2012.685261 Allwein, 2000, Reducing multiclass to binary: A unifying approach for margin classifiers, Journal of Machine Learning Research, 1, 113 Axelsson, S. (1998). Research in intrusion-detection systems: A survey. Technical Report 98–17, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. Axelsson, 2000, The base-rate fallacy and the difficulty of intrusion detection, ACM Transaction on Information Systems and Security, 3, 186, 10.1145/357830.357849 Benferhat, 2013, An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge, Applied Intelligence, 38, 520, 10.1007/s10489-012-0383-7 Casillas, 2005, Genetic tuning of fuzzy rule deep structures preserving interpretability and its interaction with fuzzy rule set reduction, IEEE Transactions on Fuzzy Systems, 13, 13, 10.1109/TFUZZ.2004.839670 Chang, 2011, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, 2, 27:1, 10.1145/1961189.1961199 Chebrolu, 2005, Feature deduction and ensemble design of intrusion detection systems, Computers and Security, 24, 295, 10.1016/j.cose.2004.09.008 Chen, 2007, Hybrid flexible neural-tree-based intrusion detection systems, International Journal Intelligent Systems, 22, 337, 10.1002/int.20203 Chung, 2012, A hybrid network intrusion detection system using simplified swarm optimization (SSO), Applied Soft Computing, 12, 3014, 10.1016/j.asoc.2012.04.020 Cordón, 1999, A proposal on reasoning methods in fuzzy rule-based classification systems, International Journal of Approximate Reasoning, 20, 21, 10.1016/S0888-613X(00)88942-2 Cordón, 2004, Ten years of genetic fuzzy systems: Current framework and new trends, Fuzzy Sets and Systems, 141, 5, 10.1016/S0165-0114(03)00111-8 Debar, 1999, Towards a taxonomy of intrusion-detection systems, Computer Networks, 31, 805, 10.1016/S1389-1286(98)00017-6 Denning, 1987, An intrusion detection model, IEEE Transactions on Software Engineering, 13, 222, 10.1109/TSE.1987.232894 Dickerson, J., & Dickerson, J. (2000). Fuzzy network profiling for intrusion detection. In Proceedings of the 19th International Conference of the North American Fuzzy Information Society (NAFIPS’00), (pp. 301–306). Atlanta, GA, USA. IEEE Press. Dickerson, J., Juslin, J., Koukousoula, O., & Dickerson, J. (2001). Fuzzy intrusion detection. In Proceedings of the 20th International Conference of the North American Fuzzy Information Society (NAFIPS’01) and Joint the 9th IFSA World Congress, vol. 3, (pp. 1506–1510). Vancouver, Canada. IEEE Press. Dietterich, 2000, An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization, Machine Learning, 40, 139, 10.1023/A:1007607513941 Eiben, 2003, Introduction to evolutionary computation Fernández, 2010, Solving multi-class problems with linguistic fuzzy rule based classification systems based on pairwise learning and preference relations, Fuzzy Sets and Systems, 161, 3064, 10.1016/j.fss.2010.05.016 Florez, G., Bridges, S., & Vaughn, R. (2002). An improved algorithm for fuzzy data mining for intrusion detection. In Proceedings of the 21st North American Fuzzy Information Processing Society Conference (NAFIPS’02), (pp. 457–462). New Orleans, LA. Fürnkranz, 2002, Round robin classification, Journal of Machine Learning Research, 2, 721 Gacto, 2011, Interpretability of linguistic fuzzy rule-based systems: An overview of interpretability measures, Information Sciences, 181, 4340, 10.1016/j.ins.2011.02.021 Galar, 2011, An overview of ensemble methods for binary classifiers in multi-class problems: Experimental study on one-vs-one and one-vs-all schemes, Pattern Recognition, 44, 1761, 10.1016/j.patcog.2011.01.017 Gomez, J. % Dasgupta, D. (2001). Evolving fuzzy classifiers for intrusion detection. In Proceedings of IEEE Workshop on Information Assurance, (pp. 68–75). United States Military Academy, West Point, New York. Greene, 1993, Competition-based induction of decision models from examples, Machine Learning, 13, 229, 10.1007/BF00993044 Guo, 2014, A distance sum-based hybrid method for intrusion detection, Applied Intelligence, 40, 178, 10.1007/s10489-013-0452-6 Hall, 2009, The WEKA data mining software: An update, SIGKDD Explorations, 11, 10, 10.1145/1656274.1656278 Han, 2006, Data mining Hastie, 1998, Classification by pairwise coupling, The Annals of Statistics, 26, 451, 10.1214/aos/1028144844 Herrera, 2008, Genetic fuzzy systems: Taxonomy, current research trends and prospects, Evolutionary Intelligence, 1, 27, 10.1007/s12065-007-0001-5 Hüllermeier, 2008, Learning valued preference structures for solving classification problems, Fuzzy Sets and Systems, 159, 2337, 10.1016/j.fss.2008.01.021 Hüllermeier, 2010, Combining predictions in pairwise classification: An optimal adaptive voting strategy and its relation to weighted voting, Pattern Recognition, 43, 128, 10.1016/j.patcog.2009.06.013 Ishibuchi, 2004 Ishibuchi, 2005, Rule weight specification in fuzzy rule–based classification systems, IEEE Transactions on Fuzzy Systems, 13, 428, 10.1109/TFUZZ.2004.841738 Kavsek, 2006, Apriori-sd: Adapting association rule learning to subgroup discovery, Applied Artificial Intelligence, 20, 543, 10.1080/08839510600779688 Khor, 2012, A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection, Applied Intelligence, 36, 320, 10.1007/s10489-010-0263-y Kuok, 1998, Mining fuzzy association rules in databases, SIGMOD Record, 27, 41, 10.1145/273244.273257 Lee, 2000, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information Systems and Security, 3, 227, 10.1145/382912.382914 Lee, 1999, A data mining framework for building intrusion detection models, 120 Lee, 2000, Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review, 16, 533, 10.1023/A:1006624031083 López, 2013, An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics, Information Sciences, 250, 113, 10.1016/j.ins.2013.07.007 López, 2013, Addressing covariate shift for genetic fuzzy systems classifiers: A case of study with farc-hd for imbalanced datasets, 1 Lorena, 2008, A review on the combination of binary classifiers in multiclass problems, Artificial Intelligence Review, 30, 19, 10.1007/s10462-009-9114-9 Muda, 2011, A k-means and naive bayes learning approach for better intrusion detection, Information Technology Journal, 10, 648, 10.3923/itj.2011.648.655 Orlovsky, 1978, Decision-making with a fuzzy preference relation, Fuzzy Sets and Systems, 1, 155, 10.1016/0165-0114(78)90001-5 Özyer, 2007, Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening, Journal of Network and Computer Applications, 30, 99, 10.1016/j.jnca.2005.06.002 Patcha, 2007, An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks, 51, 3448, 10.1016/j.comnet.2007.02.001 Peddabachigari, 2007, Modeling intrusion detection system using hybrid intelligent systems, Journal of Network and Computer Applications, 30, 114, 10.1016/j.jnca.2005.06.003 Quinlan, 1993 Sáez, 2014, Analyzing the presence of noise in multi-class problems: Alleviating its influence with the one-vs-one decomposition, Knowledge and Information Systems, 38, 179, 10.1007/s10115-012-0570-1 Sanz, 2013, Ivturs: A linguistic fuzzy rule-based classification system based on a new interval-valued fuzzy reasoning method with tuning and rule selection, IEEE Transactions on Fuzzy Systems, 21, 399, 10.1109/TFUZZ.2013.2243153 Smith, S. (1980). A learning system based on genetic algorithms. (Ph.D. thesis), University of Pittsburgh, Pittsburgh, PA. Smith, S. (1983). Flexible learning of problem solving heuristics through adaptive search. In 8th International Joint Conference on Artificial Intelligence, (pp. 422–425). Tajbakhsh, 2009, Intrusion detection using fuzzy association rules, Applied Soft Computing, 9, 462, 10.1016/j.asoc.2008.06.001 Tsang, 2007, Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection, Pattern Recognition, 40, 2373, 10.1016/j.patcog.2006.12.009 Venturini, 1993, SIA: A supervised inductive algorithm with genetic search for learning attributes based concepts, vol. 667, 280 Victorie, 2012, A local search guided differential evolution algorithm based fuzzy classifier for intrusion detection in computer networks, International Journal of Soft Computing, 6, 158 Wang, 2005, Agent-based evolutionary approach for interpretable rule-based knowledge extraction, IEEE Transactions On Systems, Man, And Cybernetics - Part C: Applications And Reviews, 35, 143, 10.1109/TSMCC.2004.841910 Wu, 2010, The use of computational intelligence in intrusion detection systems: A review, Applied Soft Computing, 10, 1, 10.1016/j.asoc.2009.06.019 Yi, 2011, Incremental SVM based on reserved set for network intrusion detection, Expert Systems with Applications, 38, 7698, 10.1016/j.eswa.2010.12.141 Zhang, 2002, Association rule mining, models and algorithms, vol. 2307 Zhu, 2001, Data mining for network intrusion detection: A comparison of alternative methods, Decision Sciences, 32, 635, 10.1111/j.1540-5915.2001.tb00975.x