Due to the ever growing number of cyber attacks, especially of the online systems, development and operation of adaptive Intrusion Detection Systems (IDSs) is badly needed so as to protect these systems. It remains as a goal of paramount importance to achieve and a serious challenge to address. Different selection methods have been developed and implemented in Genetic Algorithms (GAs) to enhance the rate of detection of the IDSs. In this respect, the present study employed the eXtended Classifier System (XCS) for detection of intrusions by matching the incoming environmental message (packet) with a classifiers pool to determine whether the incoming message is a normal request or an intrusion. Fuzzy Clustering by Local Approximation Membership (FLAME) represents the new selection method used in GAs. In this study, Genetic Algorithm with FLAME selection (FGA) was used as a production engine for the XCS. For comparison purposes, different selection methods were compared with FLAME selection and all experiments and evaluations were performed by using the KDD’99 dataset.
References
[1]
Surat, S., Werasak, K., Witcha, Ch. and Siriporn, Ch. (2005) Network Anomaly Detection Using Soft Computing. Proceedings of World Academy of Science, Engineering and Technology, 9, 140-144.
[2]
Khan, M.S.A. (2011) Rule Based Network Intrusion Detection Using Genetic Algorithm. International Journal of Computer Applications, 18, 26-29.
[3]
Srinivasu, P. and Avadhani, P.S. (2012) Genetic Algorithm Based Weight Extraction Algorithm for Artificial Neural Network Classifier in Intrusion Detection. Procedia Engineering, 38, 144-153. https://doi.org/10.1016/j.proeng.2012.06.021
[4]
Li, W.S., Bai, X.M., Duan, L.Z. and Zhang, X. (2011) Intrusion Detection Based on Ant Colony Algorithm of Fuzzy Clustering. International Conference on Computer Science and Network Technology, IEEE, Piscataway, 1642-1645.
[5]
Geramiraz, F., Memaripour, A.S. and Abbaspour, M. (2012) Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. International Journal of Network Security, 14, 352-361.
[6]
Ganapathy, S., Yogesh, P. and Kannan, A. (2012) Intelligent Agent Based Intrusion Detection Using Enhanced Multiclass SVM. Computational Intelligence and Neuroscience, 10.
[7]
Chan, P.K., Mahoney, M.V. and Arshad, M.H. (2003) A Machine Learning Approach to Anomaly Detection. Florida Institute of Technology, Tech. Rep. CS-2003-06.
[8]
Amreen Sultana, A. and Jabbar, M.A. (2016) Intelligent Network Intrusion Detection System Using Data Mining Techniques. 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 21 July 2016.
[9]
Goldberg, D.E. (1989) Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Boston.
[10]
Wafa, A. (2013) Applying Artificial Neural Network and Extended Classifier System for Network Intrusion Detection. International Arab Journal of Information Technology (IAJIT).
[11]
Danane, Y. and Parvat, T. (2015) Intrusion Detection System Using Fuzzy Genetic Algorithm. International Conference on Pervasive Computing (ICPC).
https://doi.org/10.1109/PERVASIVE.2015.7086963
[12]
Kemmerer, R.A. and Vigna, G. (2002) Intrusion Detection: A Brief History and Overview. Computer, 35.
[13]
Yin, G., Zhang, Y. and Zhao, Z. (2017) A Novel Computer Network Intrusion Detection Algorithm Based on OSVM and Context Validation. International Conference on Progress in Informatics and Computing (PIC).
[14]
Kamble Jayshree, R. and Rangdale, S.P. (2014) Intrusion Detection Using Data Mining Approach. International Journal of Science and Research (IJSR), 3, 1142-1145.
[15]
Chen, Ch., Guan, D.J., Huang, Y. and Ou, Y. (2012) Attack Sequence Detection in Cloud Using Hidden Markov Model. The Seventh Asia Joint Conference on Information Security (Asia JCIS), 100-103. https://doi.org/10.1109/AsiaJCIS.2012.24
[16]
Shrivastava, S.K. and Jain, P. (2011) Effective Anomaly Based Intrusion Detection Using Rough Set Theory and Support Vector Machine. International Journal of Computer Applications, 18, 35-41.
[17]
https://kdd.ics.uci.edu/
[18]
Urbanowicz, R.J. and Moore, J.H. (2009) Learning Classifier Systems: A Complete Introduction, Review, and Roadmap. Journal of Artificial Evolution and Applications, 2009, Article ID: 736398.
[19]
Wilson, S.W. (1995) Classifier Fitness Based on Accuracy. Evolutionary Computation, 3, 149-175. https://doi.org/10.1162/evco.1995.3.2.149
[20]
Luca, L.P. (2008) Learning Classifier Systems: Then and Now. Evolutionary Intelligence, 1, 63-82.
[21]
Holmes, J.H., et al. (2002) Learning Classifier Systems: New Models, Successful Applications. Information Processing Letters, 82, 23-30.
https://doi.org/10.1016/S0020-0190(01)00283-6
[22]
Bull, L. and Kovacs, T. (2005) Foundations of Learning Classifier Systems. Springer Science & Business Media, Berlin, Vol. 183. https://doi.org/10.1007/b100387
[23]
Sampath, P. and Prabhavathy, M. (2015) Web Page Access Prediction Using Fuzzy Clustering by Local Approximation Memberships (FLAME) Algorithm. ARPN Journal of Engineering and Applied Sciences, 10, 3217-3220.
[24]
Fu, L. and Medico, E. (2007) FLAME, a Novel Fuzzy Clustering Method for the Analysis of DNA Microarray Data. BMC Bioinformatics, 8, 3.
[25]
Elhamahmy, M.E., Elmahdy, H.N. and Saroit, I.A. (2010) A New Approach for Evaluating Intrusion Detection System. International Journal of Artificial Intelligent Systems and Machine Learning, 2.
[26]
Gulshan, K. (2014) Evaluation Metrics for Intrusion Detection Systems—A Study. International Journal of Computer Science and Mobile Applications, 2, 11.