Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection

被引:29
|
作者
Liu, Jinping [1 ]
Zhang, Wuxia [1 ]
Tang, Zhaohui [3 ]
Xie, Yongfang [3 ]
Ma, Tianyu [2 ]
Zhang, Jingjing [1 ]
Zhang, Guoyong [3 ]
Niyoyita, Jean Paul [4 ]
机构
[1] Hunan Normal Univ, Hunan Prov Key Lab Intelligent Comp & Language In, Changsha 410081, Hunan, Peoples R China
[2] Hunan Normal Univ, Coll Phys & Elect, Changsha 410081, Hunan, Peoples R China
[3] Cent South Univ, Sch Automat, Changsha 410083, Hunan, Peoples R China
[4] Univ Rwanda, Coll Sci & Technol, Kigali 3286, Rwanda
基金
中国国家自然科学基金;
关键词
Intrusion detection system; Gaussian mixture model; Greedy algorithm; Fuzzy rough set; Information gain ratio; Pattern learning; SUPPORT VECTOR MACHINE; DETECTION SYSTEM; TRANSITIVE CLOSURE; GENETIC-ALGORITHM; REDUCTION; OPTIMIZATION; HYPERGRAPH; PARAMETER; DENSITY;
D O I
10.1016/j.eswa.2019.112845
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, an adaptive network intrusion detection method using fuzzy rough set-based feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy rough set theory, the optimal attribute subset of network connection records is achieved by the information gain ratio criterion in advance. A greedy algorithm-based global optimal Gaussian mixture model (GMM) clustering method, termed GA-GOGMM, is introduced, to extract the intrinsic structure of network instances to achieve highly-discernable and stable normal and intrusion pattern libraries for the subsequent network intrusion detection (NID). GA-GOGMM-based pattern learning can achieve the optimal GMM of network traffic instances for the pattern clustering while avoiding the negative effect of the empirical initialization of clustering numbers and random initialization of clustering centers with a low computational complexity. An adaptive model updating mechanism is further introduced for the online updating of normal and intrusion pattern libraries to ensure the adaptability of the NID model. Extensive validation and comparative experiments, conducted on a benchmark dataset NSL-KDD and a self-built Nidsbench-based network simulation platform, show that the proposed ANID approach leads to a significant improvement in detection accuracies with low false alarms and missing reports on both known and unknown attacks. It can effectively adapt to the dynamic changing network environments with high detection accuracy and low false alarm rate as well as low missing reporting rate, which has significant application prospects. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Research on Intrusion Detection of Database based on Rough Set
    Zhang, Jihong
    Chen, Xiaoquan
    [J]. INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1637 - 1641
  • [42] A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection
    Ren, Min
    Wang, Zhihao
    Zhao, Peiying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 278 - 299
  • [43] Feature Selection for Flow-based Intrusion Detection Using Rough Set Theory
    Beer, Frank
    Buehler, Ulrich
    [J]. PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 617 - 624
  • [44] Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems
    Raman, M. R. Gauthama
    Kannan, K.
    Pal, S. K.
    Sriram, V. S. Shankar
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 612 - 617
  • [45] Rough Set-Based Incremental Learning Approach to Face Recognition
    Chen, Xuguang
    Ziarko, Wojciech
    [J]. ROUGH SETS AND CURRENT TRENDS IN COMPUTING, PROCEEDINGS, 2010, 6086 : 356 - 365
  • [46] A fuzzy similarity-based rough set approach for attribute selection in set-valued information systems
    Shivani Singh
    Shivam Shreevastava
    Tanmoy Som
    Gaurav Somani
    [J]. Soft Computing, 2020, 24 : 4675 - 4691
  • [47] A Novel Approach to Fuzzy Rough Set-Based Analysis of Information Systems
    Mieszkowicz-Rolka, Alicja
    Rolka, Leszek
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, PT IV, 2016, 432 : 173 - 183
  • [48] Reduction of rough set attribute based on immune clone selection
    Liang L.
    Xu G.-H.
    [J]. Frontiers of Mechanical Engineering in China, 2006, 1 (4): : 413 - 417
  • [49] A fuzzy similarity-based rough set approach for attribute selection in set-valued information systems
    Singh, Shivani
    Shreevastava, Shivam
    Som, Tanmoy
    Somani, Gaurav
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4675 - 4691
  • [50] Automatic authentication using rough set-based technique and fuzzy decision
    陈宁
    冯博琴
    王海笑
    张浩
    [J]. Journal of Harbin Institute of Technology(New series), 2009, (02) : 247 - 250