Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection
A prototype of intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using tradition...
Saved in:
| Published in: | I-Manager's Journal on Software Engineering Vol. 1; no. 4; pp. 23 - 30 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Nagercoil
iManager Publications
01.04.2007
|
| Subjects: | |
| ISSN: | 0973-5151, 2230-7168 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | A prototype of intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components. |
|---|---|
| AbstractList | A prototype of intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components. |
| Author | Salome, Jacinth Ravishankar, Ramya |
| Author_xml | – sequence: 1 givenname: Jacinth surname: Salome fullname: Salome, Jacinth – sequence: 2 givenname: Ramya surname: Ravishankar fullname: Ravishankar, Ramya |
| BookMark | eNqNkTFPwzAYRC1UJErpxg-wxMJAij87seOxammpVMQCs2Ucp6RK7WA7Q_vriSgTE9Pd8HTS6V2jkfPOInQLZEY5Z_njPtoZzPKZYHCBxpQykgng5QiNiRQsK6CAKzSNcU8IoZLnvJBjtF71p9MRL3XS-KVxjdth7Sq8ts6mxuB5u_OhSZ-HiOdd1za2wsnjjUuhj413eGmTNWloN-iy1m2009-coPfV09viOdu-rjeL-TYzwIBltJaW01pTK_JK0pJJLj-EYQUBK3VZD0eYqAitippoxjUxIKtSV6S0pGKGsQm6P-92wX_1NiZ1aKKxbaud9X1UwCVlogD5D7TgAkCWkgzo3R907_vghiMKcsEkKaWEgXo4Uyb4GIOtVReagw5HBUT9OFCDAwUqV4MD9g1uh3kx |
| Cites_doi | 10.1109/RISP.1990.63857 10.1109/RISP.1992.213257 10.21236/ADA375846 |
| ContentType | Journal Article |
| Copyright | Copyright iManager Publications Apr-Jun 2007 |
| Copyright_xml | – notice: Copyright iManager Publications Apr-Jun 2007 |
| CorporateAuthor | Lecturer ,Velammal Engg College ,Red Hills Road ,Puzhal ,Chennai |
| CorporateAuthor_xml | – name: Lecturer ,Velammal Engg College ,Red Hills Road ,Puzhal ,Chennai |
| DBID | AAYXX CITATION 04Q 04S 04W 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V L7M L~C L~D M0N M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS Q9U |
| DOI | 10.26634/jse.1.4.731 |
| DatabaseName | CrossRef India Database India Database: Business India Database: Science & Technology ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection ProQuest Indian Journals Advanced Technologies & Aerospace Collection ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database Indian Journals: Business ProQuest One Academic UKI Edition Materials Science & Engineering Collection Indian Journals: Science & Technology ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2230-7168 |
| EndPage | 30 |
| ExternalDocumentID | 3172288651 10_26634_jse_1_4_731 |
| GroupedDBID | 04Q 04S 04W 8FE 8FG AAYXX ABJCF ABUWG ACIWK AFFHD AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ HCIFZ K6V K7- L6V M7S P62 PHGZM PHGZT PQGLB PQQKQ PROAC PTHSS 3V. 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U PUEGO |
| ID | FETCH-LOGICAL-c1313-2f9e62fa2e74d9283969b7c3501e9a8f66337d02d5f0a36a0c19d8ad08e0d3c33 |
| IEDL.DBID | 04Q |
| ISSN | 0973-5151 |
| IngestDate | Fri Sep 05 08:08:12 EDT 2025 Thu Sep 04 14:30:17 EDT 2025 Fri Jul 25 12:12:06 EDT 2025 Sat Nov 29 02:58:51 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1313-2f9e62fa2e74d9283969b7c3501e9a8f66337d02d5f0a36a0c19d8ad08e0d3c33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 1473908991 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_1692375193 proquest_miscellaneous_1567119890 proquest_journals_1473908991 crossref_primary_10_26634_jse_1_4_731 |
| PublicationCentury | 2000 |
| PublicationDate | 20070401 |
| PublicationDateYYYYMMDD | 2007-04-01 |
| PublicationDate_xml | – month: 04 year: 2007 text: 20070401 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | Nagercoil |
| PublicationPlace_xml | – name: Nagercoil |
| PublicationTitle | I-Manager's Journal on Software Engineering |
| PublicationYear | 2007 |
| Publisher | iManager Publications |
| Publisher_xml | – name: iManager Publications |
| References | ref0 ref2 ref1 ref4 ref3 |
| References_xml | – ident: ref4 – ident: ref3 – ident: ref1 doi: 10.1109/RISP.1990.63857 – ident: ref2 doi: 10.1109/RISP.1992.213257 – ident: ref0 doi: 10.21236/ADA375846 |
| SSID | ssj0002964659 |
| Score | 1.6248604 |
| Snippet | A prototype of intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Index Database |
| StartPage | 23 |
| SubjectTerms | Computer information security Data mining Deviation Fuzzy Fuzzy logic Fuzzy set theory Genetic algorithms Intrusion |
| Title | Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection |
| URI | https://www.proquest.com/docview/1473908991 https://www.proquest.com/docview/1567119890 https://www.proquest.com/docview/1692375193 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2230-7168 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964659 issn: 0973-5151 databaseCode: P5Z dateStart: 20060701 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2230-7168 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964659 issn: 0973-5151 databaseCode: K7- dateStart: 20060701 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 2230-7168 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964659 issn: 0973-5151 databaseCode: M7S dateStart: 20060701 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: India Database customDbUrl: eissn: 2230-7168 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964659 issn: 0973-5151 databaseCode: 04Q dateStart: 20060701 isFulltext: true titleUrlDefault: https://search.proquest.com/indianjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2230-7168 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964659 issn: 0973-5151 databaseCode: BENPR dateStart: 20060701 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8QwFA5uBy8uqDguQwQ9ZmyatGlO4jYq6jCuiJeSyeKCdkZbBf31vrQdxYsXL4XSR1u-vLw97yG0zo1VykWG9KhxhIskIKpHKVHMOkvDnqtC2dcnotNJbm5ktw645XVZ5VAmloLa9LWPkW9SLliZo6Jbgxfip0b57Go9QmMUjXs95TdmwM--Yyw-pRhHVbs9wQioblrVvoNWYnzzMbct2uItwehvrfRbKJeapj3933-cQVO1jYm3K6aYRSM2m0MH7bfPzw-8pwqFT8upEFhlBvu200CGt5_u4E3F_XOOa8MUF318lPkzGbB0eM8WZdFWNo-u2vuXu4eknqJANGWUkdBJG4dOhVZwI8GakLHsCe0TilaqxAEUTJggNJELFItVoKk0iTJBYgPDNGMLaCzrZ3YRYVg5IAAXUMWOKxmBr2O4DaVOwGziWjfQxhDFdFA1y0jBySjRTgHtlKY8BbQbaGWIX1pvmTz9Aa-B1r4fA7P7DIbKbP8NaKJYUF_lFfxBE4PNKrxhuvT3Z5bRZBWo9WU4K2gMALWraEK_Fw_5a7PkpCYa39nvdM_h7liQpi8MvYBrN7r9AkLX1bY |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9wwEB4hqEQvpRVUXUqpK5Wjlzh24vhQVYjtltUuKw604uZ6_ehDNEtJoIIfxW9knGyouHDj0HNGiuXv87ztAXgvnDcmZI7OmAtUyCKhZsYYNdwHz9JZaFPZXydyOi1OTtTREtx0d2FiW2WnExtF7eY25sh3mZC8qVGxj2d_aJwaFaur3QiNlhZjf_UXQ7bqw2iA-O6k6fDT8f4BXUwVoJZxxmkalM_TYFIvhVNoXVWuZtLGAptXpghogrl0SeqykBiem8Qy5QrjksInjtuYAEWVvyJ4kccTNZb0LqcTS5h51j7vJzlFV4G1vfZoBbnY_VX5PuuLvuTsvhW8bwQayzZc-9_25Dk8W_jQZK8l_QtY8uU6fB5eXF9fkYGpDTlspl4QUzoSn9VGMbJ3-h1XXv_4XZGF403qORmV8c4JUpMMfN00pZUb8OVR1v4Slst56V8BQWaiAIa4Jg_CqAxjOSd8qmyBbqGwtgc7HWr6rH0MRGMQ1aCrEV3NtNCIbg-2Orz0QiVU-h9YPXh39xkPc6zQmNLPL1AmyyWLXWzJAzI5-uQyOt6bD__mLaweHB9O9GQ0Hb-Gp21SOrYcbcEybq5_A0_sZf2zOt9uWEzg22NT5BYUrCys |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fuzzy+Data+Mining+and+Genetic+Algorithms+Applied+to+Intrusion+Detection&rft.jtitle=I-Manager%27s+Journal+on+Software+Engineering&rft.date=2007-04-01&rft.issn=0973-5151&rft.eissn=2230-7168&rft.volume=1&rft.issue=4&rft.spage=23&rft.epage=30&rft_id=info:doi/10.26634%2Fjse.1.4.731&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0973-5151&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0973-5151&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0973-5151&client=summon |