Abstract
Sequential pattern mining, which discovers frequent subsequences as patterns in a sequence database, is an important data-mining problem with broad applications. From these discovered sequential patterns, we can discover the order of the patterns; however, they cannot tell us the time intervals between successive patterns. Accordingly, Chen et al. have proposed a fuzzy time-interval (FTI) sequential pattern mining algorithms, which reveals the time intervals between successive patterns [12][13]. In this paper, we contributed to the ongoing research on FTI sequential pattern mining by proposing a multi objective Genetic Algorithm (GA) based method. Fuzzy solves the sharp boundary problem and the refinement ability of GA helps to find the global optimum FTI sequential patterns. Our approach uses two measures as objectives, namely: Confidence and Coverage to prune the traditional Apriori algorithm. The main objective is to achieve maximum confidence and maximum coverage in the FTI sequential patterns. The paper defines the confidence of the FTI sequences, which is not yet defined in the previous researches. The main advantage of the proposed algorithm is the use of fuzzy genetic approach to discover optimized sequences in the network traffic data to classify and detect intrusion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proc. Int. Conf. Data Engineering, pp. 3–14 (1995)
Chen, Y.L., Chen, S.S., Hsu, P.Y.: Mining hybrid sequential patterns and sequential rules. Inf. Syst. 27(5), 345–362 (2002)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Academic, New York (2001)
Murali, A., Rao, M.: A survey on intrusion detection approaches. In: The First International Conference on Information and Communication Technologies, pp. 23–240 (2005)
Nong, Y., Qiang, C., Borror, C.M.: EWMA forecast of normal system activity for computer intrusion Detection. IEEE Trans., Reliab. 53(4), 557–566 (2004)
Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Technical report no. 99–15, Department of Computer Engineering. Chalmers University of Technology, Sewden (2000)
Tian, J.F., Fu, Y., Wang, J.-L.: Intrusion detection combining multiple decision trees by fuzzy logic. In: Sixth International Conference on Parallel and Distributed Computing. Application an Technologies, December 5-8, pp. 256–258 (2005)
Kumar, S., Spafford, E.H.: A software architecture to support misuse intrusion detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21, 181–199 (1995)
Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garver, T.: A real-time intrusion detection expert system (IDES)-final technical report, Technical report, Computer Science Laboratory, SRI International, Melo Park, California (February 1992)
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, pp. 26–29 (1998)
Chen, Y.L., Chiang, M.C., Ko, M.T.: Discovering time-interval sequential patterns in sequence databases. Expert Syst. Applicat. 25(3), 343–354 (2003)
Tony, Y.-L., Huang, C.-K.: Discovering Fuzzy Time-Interval Sequential Patterns in Sequence Databases. IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics 35, 959–972 (2005)
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proc. Int. Conf. Very Large Data Bases, pp. 487–499 (1994)
Pei, J., Han, J., Pinto, H., Chen, Q., Dayal, U., Hsu, M.-C.: PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth. In: Proceedings of 2001 International Conference on Data Engineering, pp. 215–224 (2001)
Han, J., Pei, J., Mortazavi-Asl, B., Chen, Q., Dayal, U., Hsu, M.-C.: FreeSpan: Frequent pattern-projected sequential pattern mining. In: Proceedings of 2000 International Conference on Knowledge Discovery and Data Mining, pp. 355–359 (2000)
Srikant, R., Agrawal, R.: Mining sequential patterns: Generalizations and performance improvements. In: Proceedings of the 5th International Conference on Extending Database Technology, pp. 3–17 (1996)
Zaki, M.J.: SPADE: An efficient algorithm for mining frequent sequences. Machine Learning Journal 42(1/2), 31–60 (2001)
Saggar, M., Agrawal, A.K., Lad, A.: Optimization of Association Rule Mining using Improved Genetic Algorithms. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 3725–3729 (2004)
Anrong, X., Shijie, H., Shiguang, J., Weihe, C.: Application of Sequential Patterns Based on User’s Interest in Intrusion Detection. In: Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education, pp. 1089–1093 (2008)
Zhou, Y., Fang, J., Yu, D.: Research on Fuzzy Genetics-Based Rule Classifier in Intrusion Detection System. In: International Conference on Intelligent Computation Technology and Automation, pp. 914–919 (2008)
Prasad, G.V.S.N.R.V., Dhanalakshmi, Y., Vijaya Kumar, V., Ramesh Babu, I.: Modeling An Intrusion Detection System Using Data Mining And Genetic Algorithms Based On Fuzzy Logic. IJCSNS International Journal of Computer Science and Network Security 8(7), 319–325 (2008)
Yunwu, W.: Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System. In: International Forum on Information Technology and Applications, pp. 221–224 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mahajan, S., Reshamwala, A. (2011). An Approach to Optimize Fuzzy Time-Interval Sequential Patterns Using Multi-objective Genetic Algorithm. In: Shah, K., Lakshmi Gorty, V.R., Phirke, A. (eds) Technology Systems and Management. Communications in Computer and Information Science, vol 145. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20209-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-20209-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20208-7
Online ISBN: 978-3-642-20209-4
eBook Packages: Computer ScienceComputer Science (R0)