Intrusion detection using a fuzzy genetics-based learning algorithm

https://doi.org/10.1016/j.jnca.2005.05.002Get rights and content

Abstract

Fuzzy systems have demonstrated their ability to solve different kinds of problems in various applications domains. Currently, there is an increasing interest to augment fuzzy systems with learning and adaptation capabilities. Two of the most successful approaches to hybridize fuzzy systems with learning and adaptation methods have been made in the realm of soft computing. Neural fuzzy systems and genetic fuzzy systems hybridize the approximate reasoning method of fuzzy systems with the learning capabilities of neural networks and evolutionary algorithms. The objective of this paper is to describe a fuzzy genetics-based learning algorithm and discuss its usage to detect intrusion in a computer network. Experiments were performed with DARPA data sets [KDD-cup data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html], which have information on computer networks, during normal behaviour and intrusive behaviour. This paper presents some results and reports the performance of generated fuzzy rules in detecting intrusion in a computer network.

Introduction

The number of intrusions into computer systems is growing. The reason is that new automated hacking tools are appearing every day, and these tools along with various system vulnerability information are easily available on the web. The problem of intrusion detection has been studied extensively in computer security (Heady et al.; Amoroso, 1999; Allen et al., 1999; Axelsson, 2000), and has received a lot of attention in machine learning and data mining (Sundar et al., 1998; Crosbie, 1995; Lee et al., 1998). Basically, there are two models of intrusion detection (Axelsson, 2000): Anomaly Detection: This model first builds the normal profile that contains metrics derived from the system operation. While monitoring the system, current observation is compared with the normal profile in order to detect changes in the patterns of utilization or behaviour of the system. Signature or Misuse Detection: This technique relies on patterns of known intrusions to match and identify intrusions. In this case, the intrusion detection problem is a classification problem.

The technique which we have used to detect intrusion in a computer network is based on fuzzy genetic learning. Fuzzy systems based on fuzzy if-rules have been successfully used in many applications areas (Sugeno, 1985; Lee, 1990). Fuzzy if–then rules were traditionally gained from human experts. Recently, various methods have been suggested for automatically generating and adjusting fuzzy if–then rules without using the aid of human experts (Wangm and Mendel, 1992; Ishibuchi et al., 1992; Abe and Lan, 1995; Mitra and Pal, 1994). Genetic algorithms (Holland, 1975; Goldberg, 1989) have been used as rule generation and optimization tools in the design of fuzzy rule-based systems (Ishibuchi et al., 1999; Herrera and Verdegay, 1995; Carse et al., 1996; Valenzuela-Rendon, 1991; Ishibuchi et al., 1995; Ishibuchi and Nakashima, 1999). Those GA-based studies on the design of fuzzy rule-based systems are usually referred to as fuzzy genetics-based machine learning methods (fuzzy GBML methods), each of which can be classified into the Pittsburgh or Michigan approach as non-fuzzy GMBL methods. Many fuzzy GMBL methods (Ishibuchi et al., 1999; Herrera and Verdegay, 1995; Carse et al., 1996) are categorized as the Pittsburgh approach (Smith, 1980) where a set of fuzzy if–then rules is coded as an individual. Some studies (Valenzuela-Rendon, 1991; Ishibuchi et al., 1995; Ishibuchi and Nakashima, 1999) are categorized as the Michigan approach (i.e., classifier systems Holland, 1975; Goldberg, 1989; Booker et al., 1989) where a single fuzzy if–then rule is coded as an individual. In this paper we have used the Michigan approach (Fig. 1) to detect intrusion in a computer network.

This paper is organized as follows: First we discuss intrusion detection and the data set which we have used to test the presented learning algorithm. In the next section we propose the fuzzy genetics-based learning algorithm. The following section will discuss the experimental results which we have obtained. In the last section of the paper we derive some conclusions.

Section snippets

Related work

Detecting unauthorized use, misuse and attacks on information systems is defined as intrusion detection (Denning, 1987; Kumar and Spafford, 1994). The most well-known method to detect intrusions is using audit data generated by operating systems and by networks. Since almost all activities are logged on a system, it is possible that a manual inspection of these logs would allow intrusions to be detected. It is important to analyze the audit data even after an attack has occurred, for

Intrusion dataset

In the 1998 DARPA (KDD-cup data set) intrusion detection evaluation programme, an environment was set up to get raw TCP/IP dump data for a network by simulating a typical US Air Force LAN. The LAN was operated like a real environment, but was blasted with several attacks. For each TCP/IP connection, 41 various quantitative and qualitative features were extracted. Of this database, a subset of 494 021 data were used, of which 20% represent normal patterns. The four different categories of attack

Fuzzy genetics-based learning

In this section, we will discuss the Fuzzy Genetics-based Learning method. Note that the mentioned learning method has been used for classification problems (Ishibuchi et al., 1995; Ishibuchi and Nakashima, 1999; Smith, 1980; Booker et al., 1989; Cordon et al., 2004; Ishibuchi and Murata, 1999). In this paper, we have used this method to develop our intrusion detection system.

First, let us explain the method of coding fuzzy rules. Each fuzzy if–then rule is coded as s string. The following

Experiments

In our experiments, we perform two-class classification. The training data set contains 988 randomly generated points from the two classes, with the number of data from each class proportional to its size. The normal data belong to class 1 and abnormal data belong to class 2. A different randomly selected set of 9880 points of the total data set (494 021) is used for testing different fuzzy genetic learning techniques.

In this section, we will compare the performance of the fuzzy genetics-based

Conclusions and future work

In this paper, the application of fuzzy genetics-based learning methods was introduced on intrusion detection problem. By computer simulations, a high performance of these algorithms was demonstrated.

Moreover, the paper suggested a new fitness function called SRPP. The characteristic features of the proposed fitness function are as follows:

  • (1)

    The algorithm is capable of producing fuzzy rules which are more effective for detecting intrusion in a computer network (Table 1).

  • (2)

    The improvement of

References (48)

  • Axelsson S. Intrusion detection systems: a survey and taxonomy. Technical report no. 99-15, Department of Computer...
  • Cannady J. Artificial neural networks for misuse detection. In: National information systems security conference, 1998....
  • Crosbie M. Applying genetic programming to intrusion detection. In: Proceedings of the AAAI 1995 fall symposium series,...
  • Crosbie M, Spafford EH. Defending a computer system using autonomous agents. Technical report CSD-TR-95-022,...
  • Dasgupta D. Immunity-based intrusion detection system: a general framework. In: Proceedings of 22nd the national...
  • Debar H, Becke B, Siboni D. A neural network component for an intrusion detection system. In: Proceedings of the IEEE...
  • Debar H, Dorizzi B. An application of a recurrent network to an intrusion detection system. In: Proceedings of the...
  • D. Denning

    An intrusion-detection model

    IEEE Transactions on Software Engineering

    (1987)
  • Fan W, Lee W, Miller M, Stolfo SJ, Chan PK. Using artificial anomalies to detect unknown and know network intrusions....
  • D.E. Goldberg

    Genetic algorithms in search, optimization, and machine learning

    (1989)
  • Gomez J, Dasgupta D. Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE workshop on...
  • Heady R, Luger G, Maccabe A, Sevilla M. The architecture of a network-level intrusion detection system, Technical...
  • M.L. Herrera et al.

    Tuning fuzzy logic controllers by genetic algorithms

    International Journal of Approximate Reasoning

    (1995)
  • J.H. Holland

    Adaptation in natural and artificial systems

    (1975)
  • Cited by (106)

    View all citing articles on Scopus
    View full text