Skip to main content

Immune Algorithm Optimization of Membership Functions for Mining Association Rules

  • Conference paper
Advances in Natural Computation (ICNC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4222))

Included in the following conference series:

Abstract

In the paper, immune algorithm(IA) is proposed for optimizing membership function of fuzzy variables for mining associate rules. It is used in network detection to testify its efficiency in such mining task, including maximizing the similarity between normal association rule sets while minimizing the similarity between a normal and an abnormal association rule set. Experiment results show that IA-optimization based fuzzy logic system can improve the performance of mining associate rules in network intrusion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proceedings of the 20th International Conference on very Large Databases. Morgan Kaufmann, San Francisco (1994)

    Google Scholar 

  2. Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  3. Cutello, V., Nicosia, G.: An Immunological Approach to Combinatorial Optimization Problems. In: Garijo, F.J., Riquelme, J.-C., Toro, M. (eds.) IBERAMIA 2002. LNCS (LNAI), vol. 2527, pp. 361–370. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Endoh, S., Toma, N., Yamada, K.: Immune Algorithm for n-TSP. In: Proceedings of the IEEE Systems, Man and Cybernetics Conference, pp. 3844–3849 (1998)

    Google Scholar 

  5. Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  6. Gonzales, F.A., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of Genetic and Evolutionary Computation, pp. 1081–1088. Morgan Kaufmann, San Mateo (2002)

    Google Scholar 

  7. Kephart, J.: A Biologically Inspired Immune System for Computers. In: Proceedings of Artificial Life, pp. 130–139 (1994)

    Google Scholar 

  8. Kelsey, J., Timmis, J.: Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 207–218. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Kuok, C., Fu, A., Wong, M.: Mining Fuzzy Association Rules in Databases. SIGMOD Record 17(1), 41–46 (1998)

    Article  Google Scholar 

  10. Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium. Usenix Association, Berkeley (1998)

    Google Scholar 

  11. Lee, W., Stolfo, S., Mok: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (1999)

    Google Scholar 

  12. Porras, P., Valdes, A.: Live Traffic Analysis of TCP/IP Gateways. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1998)

    Google Scholar 

  13. Nasaroui, O., Gonzales, F., Dasgupta, D.: The Fuzzy Artificial Immune System:Motivations, Basic Concepts, and Application to Clustering and Web Profiling. In: Proceedings of IEEE International Conference on Fuzzy Systems, pp. 711–716 (2002)

    Google Scholar 

  14. Tang, K.S., Man, K.F., Liu, Z.F., Kwong, S.: Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms. IEEE Transactions on Industrial Electronics 45(1), 162–169 (1998)

    Article  Google Scholar 

  15. Wang, W.D., Susan, M.B.: Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules. In: International Joint Conference on Information Systems, Fuzzy Theory and Technology Conference (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mo, H., Zuo, X., Xu, L. (2006). Immune Algorithm Optimization of Membership Functions for Mining Association Rules. In: Jiao, L., Wang, L., Gao, X., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881223_12

Download citation

  • DOI: https://doi.org/10.1007/11881223_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45907-1

  • Online ISBN: 978-3-540-45909-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics