Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Title | Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Douzi, S., Benchaji, I., ElOuahidi, B. |
Conference Name | 2018 2nd Cyber Security in Networking Conference (CSNet) |
Date Published | Oct. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-7045-3 |
Keywords | anomaly detection, anomaly intrusions, Clustering algorithms, computer networks, considerable increase, decision making, decrease resource utilization, Deep Learning, feature extraction, fuzzy association rules, Fuzzy logic, fuzzy logic scheme, fuzzy set theory, Fuzzy sets, hybrid approach, input data space, Internet rapid development, Intrusion detection, intrusion detection system, Metrics, misuse detection, network technologies, pattern clustering, pubcrawl, rapid development, reduced dataset, resilience, Resiliency, security, security of data, Time complexity, Training, weighted fuzzy C-mean clustering algorithm |
Abstract | Rapid development of internet and network technologies has led to considerable increase in number of attacks. Intrusion detection system is one of the important ways to achieve high security in computer networks. However, it have curse of dimensionality which tends to increase time complexity and decrease resource utilization. To improve the ability of detecting anomaly intrusions, a combined algorithm is proposed based on Weighted Fuzzy C-Mean Clustering Algorithm (WFCM) and Fuzzy logic. Decision making is performed in two stages. In the first stage, WFCM algorithm is applied to reduce the input data space. The reduced dataset is then fed to Fuzzy Logic scheme to build the fuzzy sets, membership function and the rules that decide whether an instance represents an anomaly or not. |
URL | https://ieeexplore.ieee.org/document/8602882 |
DOI | 10.1109/CSNET.2018.8602882 |
Citation Key | douzi_hybrid_2018 |
- reduced dataset
- Intrusion Detection
- intrusion detection system
- Metrics
- misuse detection
- network technologies
- pattern clustering
- pubcrawl
- rapid development
- Internet rapid development
- resilience
- Resiliency
- security
- security of data
- Time complexity
- Training
- weighted fuzzy C-mean clustering algorithm
- Anomaly Detection
- input data space
- hybrid approach
- Fuzzy sets
- fuzzy set theory
- fuzzy logic scheme
- Fuzzy logic
- fuzzy association rules
- feature extraction
- deep learning
- decrease resource utilization
- Decision Making
- considerable increase
- computer networks
- Clustering algorithms
- anomaly intrusions