4.5 Article

Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions

Journal

SYMMETRY-BASEL
Volume 13, Issue 7, Pages -

Publisher

MDPI
DOI: 10.3390/sym13071211

Keywords

intrusion detection; fuzzy classifier; clustering; feature selection; whale optimization algorithm; KDD Cup 1999

Funding

  1. Ministry of Science and Higher Education of the Russian Federation [FEWM-2020-0042]

Ask authors/readers for more resources

This paper investigates a method to build intrusion detection systems using a classifier based on fuzzy rules, with the use of the whale optimization algorithm to solve related problems and evaluate its performance. The resulting classifiers have a competitive edge compared to other classifiers.
The quantity of network attacks and the harm from them is constantly increasing, so the detection of these attacks is an urgent task in the information security field. In this paper, we investigate an approach to building intrusion detection systems using a classifier based on fuzzy rules. The process of creating a fuzzy classifier based on a given set of input and output data can be presented as a solution to the problems of clustering, informative features selection, and the parameters of the rule antecedents optimization. To solve these problems, the whale optimization algorithm is used. The performance of algorithms for constructing a fuzzy classifier based on this metaheuristic is estimated using the KDD Cup 1999 intrusion detection dataset. On average, the resulting classifiers have a type I error of 0.92% and a type II error of 1.07%. The obtained results are also compared with the results of other classifiers. The comparison shows the competitiveness of the proposed method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available