Skip to main content

Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks

  • Conference paper
Intelligent Distributed Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 321))

Abstract

With the drastic increase in internet usage, various categories of attacks have also evolved. Conventional intrusion detection techniques to counter these attacks have failed and thus substantial systems are needed to eliminate these attacks before they inflict huge damage. With the ability of computational intelligence systems to adapt, exhibit fault tolerance, high computational speed and error resilience against noisy information, a hybrid genetic fuzzy rule based inference engine has been designed in this paper. The fuzzy logic constructs precise and flexible patterns while the genetic algorithm based on evolutionary computation helps in attaining an optimal solution, thus their collaboration will increase the robustness of intrusion detection system. The proposed network intrusion detection system will be able to classify normal behavior as well as anomalies in the network. Detailed analysis has been done on DARPA-KDD99 dataset to specify the behavior of each connection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Luger, G., Maccabe, A., Servilla, M.: The architecture of a network-level intrusion detection system. Department of Computer Science. College of Engineering, University of New Mexico (1990)

    Google Scholar 

  2. SANS Institute, Intrusion Detection Systems: Definition, Need and Challenges. SANS Institute (2001), http://www.sans.org/reading_room/whitepapers/detection/intrusion-detection-systems-definition-challenges_343

  3. Ishibuchi, H., Yamamoto, T.: Fuzzy Rule Selection By Data Mining Criteria And Genetic Algorithms. In: GECCO, pp. 399–406 (July 2002)

    Google Scholar 

  4. Ishibuchi, H., Yamamoto, T.: Comparison of heuristic criteria for fuzzy rule selection in classification problems. Fuzzy Optimization and Decision Making 3(2), 119–139 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Nakashima, T., Ghosh, A.: Classification confidence of fuzzy rule-based classifiers

    Google Scholar 

  6. Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering (2), 222–232 (1987)

    Google Scholar 

  7. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8), 805–822 (1999)

    Article  Google Scholar 

  8. Herrera, F., Magdalena, L.: Genetic fuzzy systems: A tutorial. Tatra Mt. Math. Publ. (Slovakia) 13, 93–121 (1997)

    Google Scholar 

  9. Middlemiss, M.J., Dick, G.: Weighted feature extraction using a genetic algorithm for intrusion detection. In: The 2003 Congress on Evolutionary Computation, CEC 2003, vol. 3, pp. 1669–1675. IEEE (December 2003)

    Google Scholar 

  10. Liao, Y., Vemuri, V.R.: Use of K-nearest neighbor classifier for intrusion detection. Computers & Security 21(5), 439–448 (2002)

    Article  Google Scholar 

  11. Lee, C.H., Shin, S.W., Chung, J.W.: Network intrusion detection through genetic feature selection. In: Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, pp. 109–114. IEEE (June 2006)

    Google Scholar 

  12. Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R.: Feature selection based on rough sets and particle swarm optimization. Pattern Recognition Letters 28(4), 459–471 (2007)

    Article  Google Scholar 

  13. Stein, G., Chen, B., Wu, A.S., Hua, K.A.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, vol. 2, pp. 136–141. ACM (March 2005)

    Google Scholar 

  14. Mukkamala, S., Sung, A.H.: Feature ranking and selection for intrusion detection systems using support vector machines. In: Proceedings of the Second Digital Forensic Research Workshop (August 2002)

    Google Scholar 

  15. Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702–1707. IEEE (2002)

    Google Scholar 

  16. Hofmann, A., Horeis, T., Sick, B.: Feature selection for intrusion detection: an evolutionary wrapper approach. In: Proceeding of the 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 1563–1568. IEEE (July 2004)

    Google Scholar 

  17. Lu, W., Traore, I.: A new evolutionary algorithm for determining the optimal number of clusters. In: 2005 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, International Conference on Computational Intelligence for Modeling, Control and Automation, vol. 1, pp. 648–653. IEEE (November 2005)

    Google Scholar 

  18. Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, vol. 6(3), pp. 321–323. IEEE Computer Press, New York (2002)

    Google Scholar 

  19. Abadeh, M.S., Mohamadi, H., Habibi, J.: Design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Expert Systems with Applications 38(6), 7067–7075 (2011)

    Article  Google Scholar 

  20. Berlanga, F.J., Rivera, A.J., del Jesús, M.J., Herrera, F.: GP-COACH: Genetic Programming-based learning of COmpact and ACcurate fuzzy rule-based classification systems for High-dimensional problems. Information Sciences 180(8), 1183–1200 (2010)

    Article  Google Scholar 

  21. Aydogan, E.K., Karaoglan, I., Pardalos, P.M.: hGA: Hybrid genetic algorithm in fuzzy rule-based classification systems for high-dimensional problems. Applied Soft Computing 12(2), 800–806 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kriti Chadha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chadha, K., Jain, S. (2015). Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks. In: Buyya, R., Thampi, S. (eds) Intelligent Distributed Computing. Advances in Intelligent Systems and Computing, vol 321. Springer, Cham. https://doi.org/10.1007/978-3-319-11227-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11227-5_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11226-8

  • Online ISBN: 978-3-319-11227-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics