Abstract
In the paper, immune algorithm(IA) is proposed for optimizing membership function of fuzzy variables for mining associate rules. It is used in network detection to testify its efficiency in such mining task, including maximizing the similarity between normal association rule sets while minimizing the similarity between a normal and an abnormal association rule set. Experiment results show that IA-optimization based fuzzy logic system can improve the performance of mining associate rules in network intrusion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proceedings of the 20th International Conference on very Large Databases. Morgan Kaufmann, San Francisco (1994)
Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)
Cutello, V., Nicosia, G.: An Immunological Approach to Combinatorial Optimization Problems. In: Garijo, F.J., Riquelme, J.-C., Toro, M. (eds.) IBERAMIA 2002. LNCS (LNAI), vol. 2527, pp. 361–370. Springer, Heidelberg (2002)
Endoh, S., Toma, N., Yamada, K.: Immune Algorithm for n-TSP. In: Proceedings of the IEEE Systems, Man and Cybernetics Conference, pp. 3844–3849 (1998)
Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 8(4), 443–473 (2000)
Gonzales, F.A., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of Genetic and Evolutionary Computation, pp. 1081–1088. Morgan Kaufmann, San Mateo (2002)
Kephart, J.: A Biologically Inspired Immune System for Computers. In: Proceedings of Artificial Life, pp. 130–139 (1994)
Kelsey, J., Timmis, J.: Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 207–218. Springer, Heidelberg (2003)
Kuok, C., Fu, A., Wong, M.: Mining Fuzzy Association Rules in Databases. SIGMOD Record 17(1), 41–46 (1998)
Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium. Usenix Association, Berkeley (1998)
Lee, W., Stolfo, S., Mok: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (1999)
Porras, P., Valdes, A.: Live Traffic Analysis of TCP/IP Gateways. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1998)
Nasaroui, O., Gonzales, F., Dasgupta, D.: The Fuzzy Artificial Immune System:Motivations, Basic Concepts, and Application to Clustering and Web Profiling. In: Proceedings of IEEE International Conference on Fuzzy Systems, pp. 711–716 (2002)
Tang, K.S., Man, K.F., Liu, Z.F., Kwong, S.: Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms. IEEE Transactions on Industrial Electronics 45(1), 162–169 (1998)
Wang, W.D., Susan, M.B.: Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules. In: International Joint Conference on Information Systems, Fuzzy Theory and Technology Conference (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mo, H., Zuo, X., Xu, L. (2006). Immune Algorithm Optimization of Membership Functions for Mining Association Rules. In: Jiao, L., Wang, L., Gao, X., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881223_12
Download citation
DOI: https://doi.org/10.1007/11881223_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45907-1
Online ISBN: 978-3-540-45909-5
eBook Packages: Computer ScienceComputer Science (R0)