A parallel genetic local search algorithm for intrusion detection in computer networks

被引:58
作者
Abadeh, Mohammad Saniee [1 ]
Habibi, Jafar [1 ]
Barzegar, Zeynab [1 ]
Sergi, Muna [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
genetic algorithms; fuzzy logic; rule extraction; intrusion detection; pattern classification;
D O I
10.1016/j.engappai.2007.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, as the boundaries cannot be well defined. One of the difficulties in such a prediction process is the generation of false alarms in many anomaly based intrusion detection systems. However, fuzzy logic is an important solution to reduce the false alarm rate in determining intrusive activities. This paper proposes a parallel genetic local search algorithm (PAGELS) to generate fuzzy rules capable of detecting intrusive behaviors in computer networks. The system uses the Michigan's approach, where each individual represents a fuzzy rule which has the form "if condition then prediction." In the presented algorithm the global population is divided into some subpopulations, each assigned to a distinct processor. Each subpopulation consists of the same class fuzzy rules. These rules evolve independently in the proposed parallel manner. Experimental results show that the presented algorithm produces fuzzy rules, which can be used to construct a reliable intrusion detection system. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1058 / 1069
页数:12
相关论文
共 56 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]   A METHOD FOR FUZZY RULES EXTRACTION DIRECTLY FROM NUMERICAL DATA AND ITS APPLICATION TO PATTERN-CLASSIFICATION [J].
ABE, S ;
LAN, MS .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1995, 3 (01) :18-28
[3]  
ANDERSON D, 1995, SRICSL9506 SRI INT
[4]  
[Anonymous], P 2005 IEEE WORKSH I
[5]  
[Anonymous], 1998, ICML
[6]  
[Anonymous], 2000, INTRUSION DETECTION
[7]  
[Anonymous], P IEEE INT C NEUR NE
[8]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[9]  
BONIFACIO JM, 1998, P IEEE WORLD C COMP
[10]  
CANNADY J, 2000, THESIS NOVA SE U