Aiming at the characteristics of uncertainty and fuzziness of the network traffic attribute, an Intuitionistic Fuzzy Reasoning Theory (IFRT) is introduced to the anomaly detection field. A method of IFRT detection based on the inclusion degree is proposed. Firstly, the membership and non-membership functions of attributes in anomaly detection are designed. Secondly, the intensity similarity measure method based on the inclusion degree is presented and the rules library is generated. And then, the FMP rules of the IFRT are presented. Finally, an anomaly detection based on the IFRT is constructed. The validity is checked by experiment on the standard detection dataset KDD99, compared with other traditional theory, the IFRT anomaly detection method performs better than others.
Dimitris K and Elpiniki I. Intuitionistic fuzzy reasoning with cognitive maps[C]. Proceedings of the IEEE International Conference on Fuzzy Systems, Taipei, China, 2011: 821-827.
[2]
Chen Cheng-hung. Compensatory neural fuzzy networks with rule-based cooperative differential evolution for nonlinear system control[J]. Nonlinear Dynamics, 2014, 75(1): 355-366.
[3]
Lei Yang, Lei Ying-jie, and Kong Wei-wei. Technique for target recognition based on intuitionistic fuzzy reasoning[J]. IET Signal Processing, 2012, 6(3): 255-263.
[4]
Mitchell H B. Pattern recognition using type-II fuzzy sets[J]. Information Sciences, 2005, 170(2/4): 409-418.
[5]
Hong Peng, Jun Wang, Mario J P J, et al.. Fuzzy reasoning spiking neural P system for fault diagnosis[J]. Information Sciences, 2013, 235: 106-116.
[6]
Luigi L and Larbi B. Using multiple uncertain examples and adaptative fuzzy reasoning to optimize image characterization[J]. Knowledge Based System, 2007, 20(3): 266-276.
Lei Ying-jie, Wang Bao-shu, and Wang Yi. Techniques for threat assessment based on intuitionistic fuzzy reasoning[J]. Journal of Electronics & Information Technology, 2007, 29(9): 2077-2081.
Lei Ying-jie, Wang Bao-shu, and Wang Yi. Techniques for battlefield situation assessment based on intuitionistic fuzzy decision[J]. Acta Electronica Sinica, 2006, 34(12): 1275-1279.
[9]
Hwang C M, Yang M S, Hung W L, et al.. A similarity measure of intuitionistic fuzzy sets based on the Sugeno integral with its application to pattern recognition[J]. Infor-
mation Sciences, 2012, 189: 93-109.
[10]
Boran F E and Akay D. A biparametric similarity measure on intuitionistic fuzzy sets with applications to pattern recognition[J]. Information Sciences, 2014, 255: 45-57.
Wang Yi, Liu San-yang, Zhang Wen, et al.. Intuitionistic fuzzy similarity measures reasoning method based on inclusion degrees[J]. Systems Engineering and Electronics, 2014, 36(3): 497-500.
Yan Xuan-hui. An artificial immune-based intrusion detection model using vaccination strategy[J]. Acta Electronica Sinica, 2009, 37(4): 780-785.
[13]
Kuang F J ,Xu W H, and Zhang S Y. A novel hybrid KPCA and SVM with GA model for intrusion detection[J]. Applied Soft Computing, 2014, 18(5): 178-184.
[14]
Abadeh M S, Mohamadi H, and Habibi J. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks[J]. Expert Systems with Applications, 2011, 38(6): 7067-7075.
[15]
Karami A and Zapata M G. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks[J]. Neurocomputing, 2014, 149(3): 1253-1269.
[16]
Hettich S and Bay S D. KDD cup 1999 data[OL]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.
[17]
Guo S Q, Gao C, Yao J, et al. An intrusion detection model based on improved random forests algorithm[J]. Journal of Software, 2005, 16(8): 1490-1498.