CFP last date
20 December 2024
Reseach Article

Amalgamation of IDS Classification with Fuzzy techniques for Sequential pattern mining

Published on None 2011 by Dr. Sunita Mahajan, Alpa Reshamwala
International Conference on Technology Systems and Management
Foundation of Computer Science USA
ICTSM - Number 3
None 2011
Authors: Dr. Sunita Mahajan, Alpa Reshamwala
09fee1cc-1358-47c3-8f89-95e057385dae

Dr. Sunita Mahajan, Alpa Reshamwala . Amalgamation of IDS Classification with Fuzzy techniques for Sequential pattern mining. International Conference on Technology Systems and Management. ICTSM, 3 (None 2011), 9-14.

@article{
author = { Dr. Sunita Mahajan, Alpa Reshamwala },
title = { Amalgamation of IDS Classification with Fuzzy techniques for Sequential pattern mining },
journal = { International Conference on Technology Systems and Management },
issue_date = { None 2011 },
volume = { ICTSM },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 9-14 },
numpages = 6,
url = { /proceedings/ictsm/number3/2792-162/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Technology Systems and Management
%A Dr. Sunita Mahajan
%A Alpa Reshamwala
%T Amalgamation of IDS Classification with Fuzzy techniques for Sequential pattern mining
%J International Conference on Technology Systems and Management
%@ 0975-8887
%V ICTSM
%N 3
%P 9-14
%D 2011
%I International Journal of Computer Applications
Abstract

Intrusion detection system has been a powerful weapon to protect networks from attacks and has gained more and more attention. Data mining has been proven as an important method to detect intrusions. Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained importance. Sequential pattern mining, which discovers frequent subsequences as patterns in a sequence database, is useful in discovering audit patterns along with time from network audit databases. Intrusion detection system uses Boolean logic in determining whether or not an intrusion is detected and the use of fuzzy logic has been investigated as an alternative. Fuzzy logic addresses the formal principles of approximate reasoning. It provides a sound foundation to handle imprecision and vagueness as well as mature inference mechanisms using varying degrees of truth. Because boundaries are not always clearly defined, fuzzy logic can be used to identify complex pattern or behavior variations. Accordingly, Chen et al. have proposed a fuzzy time-interval (FTI) sequential pattern mining algorithms, which reveals the time intervals between successive patterns [12][13]. In this paper, we contributed to the ongoing research on FTI sequential pattern mining by proposing an algorithm to detect and classify audit sequential patterns in network traffic data. The paper defines the confidence of the FTI audit sequences, which is not yet defined in the previous researches.

References
  1. Murali.A., Rao.M:A survey on intrusion detection approaches, In the First International Conference on Information and Communication Technologies .pp.233-240(2005)
  2. Nong.Y., Qiang.C., Borror.C.M: EWMA forecast of normal system activity for computer intrusion Detection. IEEE Trans, Reliab. 53(4), 557-566 (2004)
  3. Axelsson.S.: Intrusion detection systems: a survey and taxonomy. Technical report no. 99-15, Department of Computer Engineering . Chalmers University of Technology, Sewden (2000)
  4. Tian.J.F., Fu.Y., Wang.J-L: Intrusion detection combining multiple decision trees by fuzzy logic. In: Sixth International Conference on Parallel and Distributed Computing. Application an Technologies,5-8 December 2005. pp.256-258 (2005)
  5. S.kumar and E.H.Spafford, : A software architecture to support misuse intrusion detection, In proceedings of the 18th National Information Security Conference, pp 194-204(1995)
  6. K.Ilgun,R.A.Kemmerer,and P.A.Porras: State transition analysis: A rule-based intrusion detection approach, IEEE Transactions on Software Engineering, 1995,21. Pp.181- 199(1995)
  7. T.Lunt,A.Tamaru, F.Gilham, R.Jagannathan, P.Neumann, H.Javitz, A.Valdes, and T.Garver: A real-time intrusion detection expert system (IDES)-final technical report, Technical report, Computer Science Laboratory, SRI International, Melo Park, California, February(1992)
  8. Lee W and Stolfo S J: Data mining approaches for intrusion detection, Proceedings of the 7th USENIX Security Symposium, :26-29(1998)
  9. R. Agrawal and R. Srikant: Mining sequential patterns. In Proc. Int. Conf. Data Engineering, pp. 3–14(1995)
  10. Y. L. Chen, S. S. Chen, and P. Y. Hsu: Mining hybrid sequential patterns and sequential rules. Inf. Syst., vol. 27, no. 5, pp. 345–362 (2002)
  11. J. Han and M. Kamber, Data Mining: Concepts and Techniques. New York: Academic, (2001)
  12. Y. L. Chen, M. C. Chiang, and M. T. Ko: Discovering time-interval sequential patterns in sequence databases, Expert Syst. Applicat., vol. 25, no. 3, pp. 343–354(2003)
  13. Yen-Liang, Tony Cheng-Kui Huang: Discovering Fuzzy Time-Interval Sequential Patterns in Sequence Databases, IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol.35, pp.959-972(2005)
  14. R. Agrawal and R. Srikant: Fast algorithms for mining association rules, in Proc. Int. Conf. Very Large Data Bases, pp. 487–499(1994)
  15. Pei, J., Han, J., Pinto, H., Chen, Q., Dayal, U., & Hsu, M.-C. : PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth. Proceedings of 2001 International Conference on Data Engineering, pp. 215–224 (2001)
  16. Han, J., Pei, J., Mortazavi-Asl, B., Chen, Q., Dayal, U., & Hsu, M.-C. : FreeSpan: Frequent pattern-projected sequential pattern mining. Proceedings of 2000 International Conference on Knowledge Discovery and Data Mining, pp. 355–359 (2000)
  17. Srikant, R., & Agrawal, R.: Mining sequential patterns: Generalizations and performance improvements. Proceedings of the 5th International Conference on Extending Database Technology, pp. 3–17 (1996)
  18. Zaki, M. J.: SPADE: An efficient algorithm for mining frequent sequences. Machine Learning Journal, 42(1/2), 31–60 (2001)
  19. Manish Saggar, Ashish Kumar Agrawal, Abhimanyu Lad: Optimization of Association Rule Mining using Improved Genetic Algorithms, IEEE International Conference on Systems, Man and Cybernetics, pp , pp 3725- 3729 (2004)
  20. XUE Anrong, HONG Shijie, JU Shiguang, CHEN Weihe: Application of Sequential Patterns Based on User’s Interest in Intrusion Detection, Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education, pp 1089- 1093 (2008).
Index Terms

Computer Science
Information Sciences

Keywords

Data mining fuzzy sets sequence data time interval intrusion detection system