Skip to main content

An Approach to Optimize Fuzzy Time-Interval Sequential Patterns Using Multi-objective Genetic Algorithm

  • Conference paper
Technology Systems and Management

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 145))

Abstract

Sequential pattern mining, which discovers frequent subsequences as patterns in a sequence database, is an important data-mining problem with broad applications. From these discovered sequential patterns, we can discover the order of the patterns; however, they cannot tell us the time intervals between successive patterns. Accordingly, Chen et al. have proposed a fuzzy time-interval (FTI) sequential pattern mining algorithms, which reveals the time intervals between successive patterns [12][13]. In this paper, we contributed to the ongoing research on FTI sequential pattern mining by proposing a multi objective Genetic Algorithm (GA) based method. Fuzzy solves the sharp boundary problem and the refinement ability of GA helps to find the global optimum FTI sequential patterns. Our approach uses two measures as objectives, namely: Confidence and Coverage to prune the traditional Apriori algorithm. The main objective is to achieve maximum confidence and maximum coverage in the FTI sequential patterns. The paper defines the confidence of the FTI sequences, which is not yet defined in the previous researches. The main advantage of the proposed algorithm is the use of fuzzy genetic approach to discover optimized sequences in the network traffic data to classify and detect intrusion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proc. Int. Conf. Data Engineering, pp. 3–14 (1995)

    Google Scholar 

  2. Chen, Y.L., Chen, S.S., Hsu, P.Y.: Mining hybrid sequential patterns and sequential rules. Inf. Syst. 27(5), 345–362 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  3. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Academic, New York (2001)

    MATH  Google Scholar 

  4. Murali, A., Rao, M.: A survey on intrusion detection approaches. In: The First International Conference on Information and Communication Technologies, pp. 23–240 (2005)

    Google Scholar 

  5. Nong, Y., Qiang, C., Borror, C.M.: EWMA forecast of normal system activity for computer intrusion Detection. IEEE Trans., Reliab. 53(4), 557–566 (2004)

    Article  Google Scholar 

  6. Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Technical report no. 99–15, Department of Computer Engineering. Chalmers University of Technology, Sewden (2000)

    Google Scholar 

  7. Tian, J.F., Fu, Y., Wang, J.-L.: Intrusion detection combining multiple decision trees by fuzzy logic. In: Sixth International Conference on Parallel and Distributed Computing. Application an Technologies, December 5-8, pp. 256–258 (2005)

    Google Scholar 

  8. Kumar, S., Spafford, E.H.: A software architecture to support misuse intrusion detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)

    Google Scholar 

  9. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21, 181–199 (1995)

    Article  Google Scholar 

  10. Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garver, T.: A real-time intrusion detection expert system (IDES)-final technical report, Technical report, Computer Science Laboratory, SRI International, Melo Park, California (February 1992)

    Google Scholar 

  11. Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, pp. 26–29 (1998)

    Google Scholar 

  12. Chen, Y.L., Chiang, M.C., Ko, M.T.: Discovering time-interval sequential patterns in sequence databases. Expert Syst. Applicat. 25(3), 343–354 (2003)

    Article  Google Scholar 

  13. Tony, Y.-L., Huang, C.-K.: Discovering Fuzzy Time-Interval Sequential Patterns in Sequence Databases. IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics 35, 959–972 (2005)

    Article  Google Scholar 

  14. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proc. Int. Conf. Very Large Data Bases, pp. 487–499 (1994)

    Google Scholar 

  15. Pei, J., Han, J., Pinto, H., Chen, Q., Dayal, U., Hsu, M.-C.: PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth. In: Proceedings of 2001 International Conference on Data Engineering, pp. 215–224 (2001)

    Google Scholar 

  16. Han, J., Pei, J., Mortazavi-Asl, B., Chen, Q., Dayal, U., Hsu, M.-C.: FreeSpan: Frequent pattern-projected sequential pattern mining. In: Proceedings of 2000 International Conference on Knowledge Discovery and Data Mining, pp. 355–359 (2000)

    Google Scholar 

  17. Srikant, R., Agrawal, R.: Mining sequential patterns: Generalizations and performance improvements. In: Proceedings of the 5th International Conference on Extending Database Technology, pp. 3–17 (1996)

    Google Scholar 

  18. Zaki, M.J.: SPADE: An efficient algorithm for mining frequent sequences. Machine Learning Journal 42(1/2), 31–60 (2001)

    Article  MATH  Google Scholar 

  19. Saggar, M., Agrawal, A.K., Lad, A.: Optimization of Association Rule Mining using Improved Genetic Algorithms. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 3725–3729 (2004)

    Google Scholar 

  20. Anrong, X., Shijie, H., Shiguang, J., Weihe, C.: Application of Sequential Patterns Based on User’s Interest in Intrusion Detection. In: Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education, pp. 1089–1093 (2008)

    Google Scholar 

  21. Zhou, Y., Fang, J., Yu, D.: Research on Fuzzy Genetics-Based Rule Classifier in Intrusion Detection System. In: International Conference on Intelligent Computation Technology and Automation, pp. 914–919 (2008)

    Google Scholar 

  22. Prasad, G.V.S.N.R.V., Dhanalakshmi, Y., Vijaya Kumar, V., Ramesh Babu, I.: Modeling An Intrusion Detection System Using Data Mining And Genetic Algorithms Based On Fuzzy Logic. IJCSNS International Journal of Computer Science and Network Security 8(7), 319–325 (2008)

    Google Scholar 

  23. Yunwu, W.: Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System. In: International Forum on Information Technology and Applications, pp. 221–224 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mahajan, S., Reshamwala, A. (2011). An Approach to Optimize Fuzzy Time-Interval Sequential Patterns Using Multi-objective Genetic Algorithm. In: Shah, K., Lakshmi Gorty, V.R., Phirke, A. (eds) Technology Systems and Management. Communications in Computer and Information Science, vol 145. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20209-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20209-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20208-7

  • Online ISBN: 978-3-642-20209-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics