A note on genetic algorithms for large-scale feature selection
Pattern Recognition Letters
Adaptation in natural and artificial systems
Adaptation in natural and artificial systems
Distributed representation of fuzzy rules and its application to pattern classification
Fuzzy Sets and Systems
Fast training of support vector machines using sequential minimal optimization
Advances in kernel methods
Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Automated discovery of concise predictive rules for intrusion detection
Journal of Systems and Software
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
Feature selection of intrusion detection data using a hybrid genetic algorithm/KNN approach
Design and application of hybrid intelligent systems
Design and application of hybrid intelligent systems
A fast and elitist multiobjective genetic algorithm: NSGA-II
IEEE Transactions on Evolutionary Computation
Similarity measures in fuzzy rule base simplification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
On generating FC3 fuzzy rule systems from data usingevolution strategies
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Fuzzy modeling of high-dimensional systems: complexity reduction and interpretability improvement
IEEE Transactions on Fuzzy Systems
Effect of rule weights in fuzzy rule-based classification systems
IEEE Transactions on Fuzzy Systems
Compact and transparent fuzzy models and classifiers through iterative complexity reduction
IEEE Transactions on Fuzzy Systems
Constructing accurate fuzzy classifiers: A new adaptive method for rule-weight specification
International Journal of Knowledge-based and Intelligent Engineering Systems
A fuzzy-genetic approach to network intrusion detection
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
Information Sciences: an International Journal
Expert Systems with Applications: An International Journal
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines
Journal of Network and Computer Applications
Information Sciences: an International Journal
IEEE Transactions on Fuzzy Systems
Journal of Network and Computer Applications
Evolutionary multi objective optimization for rule mining: a review
Artificial Intelligence Review
Expert Systems with Applications: An International Journal
Practical real-time intrusion detection using machine learning approaches
Computer Communications
Computational intelligence algorithms analysis for smart grid cyber security
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part II
A novel feature selection method based on normalized mutual information
Applied Intelligence
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Hi-index | 0.01 |
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in pattern recognition and network security. In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy IF-THEN rules from network traffic data for classification. The proposed fuzzy rule-based system is evolved from an agent-based evolutionary framework and multi-objective optimization. In addition, the proposed system can also act as a genetic feature selection wrapper to search for an optimal feature subset for dimensionality reduction. To evaluate the classification and feature selection performance of our approach, it is compared with some well-known classifiers as well as feature selection filters and wrappers. The extensive experimental results on the KDD-Cup99 intrusion detection benchmark data set demonstrate that the proposed approach produces interpretable fuzzy systems, and outperforms other classifiers and wrappers by providing the highest detection accuracy for intrusion attacks and low false alarm rate for normal network traffic with minimized number of features.