Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

Anomaly Detection based on Fuzzy Rules

Volume 14, Number 2, February 2018, pp. 376-385
DOI: 10.23940/ijpe.18.02.p19.376385

Wenjiang Jiaoa, Qingbin Lib

aSchool of Computer Science and Technology, Shandong University, Jinan, 250100, China
bShandong University, Jinan, 250012, China



Abstract:

Essentially, the fuzzy assert rule library is the fuzzy decision tree. A fuzzy decision tree growth algorithm based on local dynamic optimization is present. Following the idea of the greedy strategy, the algorithm ensures that once a continuous attribute is chosen as a branch node, the membership functions of this attribute after fuzzifying is dynamically optimized. On the other hand, according to fuzzy logic, enhanced Apriori algorithm is present to all the fuzzy frequent item sets composed of fuzzified attributes of multiple events. Then, the fuzzy frequent item sets are transformed into fuzzy association rules that compose the fuzzy association rule library. As for a multiple event sequence, eight different detection algorithms are provided and tested on the same platform. Experiments show that two new algorithms using the fuzzy decision tree and fuzzy association rule library detection models get the highest score.

 

References: 16

    1. Songling Fu, “Distributed Online Social Network Data Storage and Optimization Research”, National Defense Science and Technology University, 2014.
    2. Xiaoshi Fan, Ying Lei and Yanan Wang, Intuitionistic Fuzzy Inference Method in Traffic Anomaly Detection”, Chinese Journal of Electronics and Information Technology, (4): 2218-2224, 2015.
    3. Cunchen Li, “Research and Application of Mass Data Distributed Storage Technology”, Beijing University of Posts and Telecommunications, 2013.
    4. Cikou Liu, Feng Wang and Mingchuan Yang, “Research on Distributed Storage Technology for Large Data”, Telecommunications Technology", vol.5, pp.33-36, 2015.
    5. Nerbu Li, “Distributed Anomaly Detection of Data Mining and Multi Stage Intrusion Alert Correlation Based on Research”, Jilin University, 2010.
    6. Shuai Liu, “Research on Multi-level Anomaly Behavior Analysis and Detection Technology for Network Data Stream”, The PLA Information Engineering University, 2015.
    7. Yang Pan, “Research on the Application of Hadoop Technology in Distributed Data Storage”, Dalian Maritime University, 2015.
    8. Yizhou Qian, “Distributed Real-time Database with High Performance Data Storage Cloud Retrieval Mechanism”, Zhejiang University, 2012.
    9. Shanqi Tao, “Research and Implementation of Intrusion Detection System for Mining Association Rules Based on Snort”, Nanjing University of Aeronautics, 2009.
    10. Yu Wang, “Data Redundancy and Maintenance Technology in Distributed Storage System”, South China University of Technology, 2011.
    11. Dongsheng Xu, Xiaoyan Ai, “Anomaly Intrusion Detection Based on Genetic Optimization and Fuzzy Rule Mining”, Computer applications, vol.6, pp. 2227-2229, 2009.
    12. Zhengmin Xia, “Study on Network Traffic Analysis and Anomaly Detection Based on Fractal”, Shanghai Jiao Tong University, 2012.
    13. Zhuoluo Yang, “Research and Implementation of Distributed Storage Technology in Data Warehouse”, Kunming University of Science and Technology, 2012.
    14. Zhenqian Yang and Yongdan Yang, “Development and Application of Distributed Storage Technology for Large Data. Electronics and Software Engineering”, vol.2, pp.201-210, 2016.
    15. Ling Zhang, “Research on Intrusion Detection Model Based on Rough Set and Artificial Immune”, Beijing University of Posts and Telecommunications, 2014.
    16. Yuping Zhou, “Research on the Key Technology of Intrusion Detection Based on Intelligent Soft Computing”, Donghua University, 2010.

       

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

      Attachments:
      Download this file (IJPE-2018-02-19.pdf)IJPE-2018-02-19.pdf[Anomaly Detection based on Fuzzy Rules]421 Kb
       

      CURRENT ISSUE

      Prev Next

      Program Disturb Research and Error Avoidance Algorithm Design of 3D-TLC NAND Flash Memory

      Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Meng Zhang, Fei Wu, and Wei Zhang

      Read more

      Data Complexity Analysis for Software Defect Detection

      Ying Ma, Yichang Li, Junwen Lu, Peng Sun, Yu Sun, and Xiatian Zhu

      Read more

      Fuzzy AHP-based Comprehensive Evaluation for Smart Grid in Energy Internet Systems

      Ying Ma, Yichang Li, Shunzhi Zhu, Nan Qin, Guang Zhao, and Chao Huang

      Read more

      User Group-based Method for Cold-Start Recommendation

      Jing He, Shuo Yuan, Yi Xiang, and Wei Zhou

      Read more

      Object Tracking Method based on 3D Cartoon Animation in Broadcast Soccer Videos

      Chunlong Xie, Zhiqian Zhang, Chunsheng Wang, and Zhengqing Liu

      Read more

      Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding

      Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang

      Read more

      Video Indexing and Retrieval based on Key Frame Extraction

      Wenshi Wang, Zhangqin Huang, Weidong Wang, Shuo Zhang, and Rui Tian

      Read more

      Modeling Approach Combining Performance and Reliability for Mobile Cloud System

      Han Xu, Haiqing Wang, Liang Luo, Xiwei Qiu, Sa Meng, and Xun Guo

      Read more

      Understanding the Similarity of Log Revision Behaviors in Open Source Software

      Xu Niu, Shanshan Li, Zhouyang Jia, Shulin Zhou, Wang Li, and Xiangke Liao

      Read more

      Learning to Predict Price based on E-commerce Online Auction Machine

      Xiaohui Li, Hongbin Dong, Xiaowei Wang, and Shuang Han

      Read more

      Rate Control Algorithm for Multiview Video Coding based on Human Visual Characteristics

      Tao Yan, In-Ho Ra, Qiuwen Zhang, Hui Wen, Hang Xu, and Shuqing Chen

      Read more
      This site uses encryption for transmitting your passwords. ratmilwebsolutions.com