Skip to main content

Study of Support Set Generation Techniques in LAD for Intrusion Detection

  • Conference paper
  • First Online:
Intelligent Systems and Pattern Recognition (ISPR 2023)

Abstract

Support Set generation is an essential process in the Logical Analysis of Data (LAD). The process of binarization results in an increase in the dimensions of the dataset, which can make the classification process more challenging. The support set generation step is performed to select the important features from the binarized dataset. In this paper, five techniques, namely Set covering problem, Mutual Information Greedy algorithm, Information Gain, Gain ratio, and Gini Index, are used to find the minimal support set for the classification of the Intrusion Detection dataset. LAD uses partially defined Boolean functions to generate positive and negative patterns from the historical observations, which are then transformed into rules for the classification of future observations. The LAD classifier is built using different techniques, and their performances on the NSL-KDD dataset are recorded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alexe, G., Alexe, S., Bonates, T.O., Kogan, A.: Logical analysis of data – the vision of Peter L. Hammer. Ann. Math. Artif. Intell. 49(1–4), 265–312 (2007). https://doi.org/10.1007/s10472-007-9065-2

    Article  MathSciNet  MATH  Google Scholar 

  2. Almuallim, H., Dietterich, T.G.: Learning Boolean concepts in the presence of many irrelevant features. Artif. Intell. 69(1–2), 279–305 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  3. Alzahrani, A.O., Alenazi, M.J.F.: Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13(5), 111 (2021)

    Article  Google Scholar 

  4. Boros, E., Hammer, P.L., Ibaraki, T., Kogan, A.: Logical analysis of numerical data. Math. Program. 79(1–3), 163–190 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  5. Boros, E., Hammer, P.L., Ibaraki, T., Kogan, A., Mayoraz, E., Muchnik, I.: An implementation of logical analysis of data. IEEE Trans. Knowl. Data Eng. 12(2), 292–306 (2000)

    Article  Google Scholar 

  6. Bruni, R.: Reformulation of the support set selection problem in the logical analysis of data. Ann. Oper. Res. 150(1), 79–92 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  7. Chauhan, S., Gangopadhyay, S.: Design of intrusion detection system based on logical analysis of data (LAD) using information gain ratio. In: Dolev, S., Katz, J., Meisels, A. (eds.) Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be’er Sheva, Israel, June 30 – July 1, 2022, Proceedings, pp. 47–65. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07689-3_4

    Chapter  Google Scholar 

  8. Chauhan, S., Mahmoud, L., Gangopadhyay, S., Gangopadhyay, A.K.: A comparative study of LAD, CNN and DNN for detecting intrusions. In: Yin, H., Camacho, D., Tino, P. (eds.) Intelligent Data Engineering and Automated Learning – IDEAL 2022: 23rd International Conference, IDEAL 2022, Manchester, UK, November 24–26, 2022, Proceedings, pp. 443–455. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21753-1_43

    Chapter  Google Scholar 

  9. Chikalov, I., et al.: Logical analysis of data: theory, methodology and applications. In: Chikalov, I., et al. (eds.) Three Approaches to Data Analysis: Test Theory, Rough Sets and Logical Analysis of Data, pp. 147–192. Springer, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-28667-4_3

    Chapter  Google Scholar 

  10. Crama, Y., Hammer, P.L.: Boolean functions: Theory, algorithms, and applications. Cambridge University Press (2011)

    Google Scholar 

  11. Das, T.K., Gangopadhyay, S., Zhou, J.: SSIDS: semi-supervised intrusion detection system by extending the logical analysis of data. arXiv preprint arXiv:2007.10608 (2020)

  12. Hammer, P.L.: Partially defined Boolean functions and cause-effect relationships. In: Proceedings of the International Conference on Multi-attribute Decision Making via OR-based Expert Systems. University of Passau (1986)

    Google Scholar 

  13. Hammer, P.L., Bonates, T.O.: Logical analysis of data-an overview: from combinatorial optimization to medical applications. Ann. Oper. Res. 148(1), 203–225 (2006)

    Article  MATH  Google Scholar 

  14. Ikram, S.T., Cherukuri, A.K.: Improving accuracy of intrusion detection model using PCA and optimized SVM. J. Comput. Inf. Technol. 24(2), 133–148 (2016)

    Article  Google Scholar 

  15. Karegowda, A.G., Manjunath, A., Jayaram, M.: Comparative study of attribute selection using gain ratio and correlation based feature selection. Int. J. Inf. Technol. Knowl. Manage. 2(2), 271–277 (2010)

    Google Scholar 

  16. Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113–125 (2023). https://doi.org/10.1016/j.comcom.2022.12.010

    Article  Google Scholar 

  17. Oqbah Ghassan Abbas, Khaldoun Khorzom, M.A.: Machine learning based intrusion detection system for software defined networks. Int. J. Eng. Res. Technol. (IJERT) 09(9) (2020)

    Google Scholar 

  18. Pathak, A., Pathak, S.: Study on decision tree and KNN algorithm for intrusion detection system. Int. J. Eng. Res. 9(05) (2020). https://doi.org/10.17577/IJERTV9IS050303

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sneha Chauhan , Sugata Gangopadhyay or Aditi Kar Gangopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chauhan, S., Gangopadhyay, S., Gangopadhyay, A.K. (2024). Study of Support Set Generation Techniques in LAD for Intrusion Detection. In: Bennour, A., Bouridane, A., Chaari, L. (eds) Intelligent Systems and Pattern Recognition. ISPR 2023. Communications in Computer and Information Science, vol 1941. Springer, Cham. https://doi.org/10.1007/978-3-031-46338-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46338-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46337-2

  • Online ISBN: 978-3-031-46338-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics