Abstract
Support Set generation is an essential process in the Logical Analysis of Data (LAD). The process of binarization results in an increase in the dimensions of the dataset, which can make the classification process more challenging. The support set generation step is performed to select the important features from the binarized dataset. In this paper, five techniques, namely Set covering problem, Mutual Information Greedy algorithm, Information Gain, Gain ratio, and Gini Index, are used to find the minimal support set for the classification of the Intrusion Detection dataset. LAD uses partially defined Boolean functions to generate positive and negative patterns from the historical observations, which are then transformed into rules for the classification of future observations. The LAD classifier is built using different techniques, and their performances on the NSL-KDD dataset are recorded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alexe, G., Alexe, S., Bonates, T.O., Kogan, A.: Logical analysis of data – the vision of Peter L. Hammer. Ann. Math. Artif. Intell. 49(1–4), 265–312 (2007). https://doi.org/10.1007/s10472-007-9065-2
Almuallim, H., Dietterich, T.G.: Learning Boolean concepts in the presence of many irrelevant features. Artif. Intell. 69(1–2), 279–305 (1994)
Alzahrani, A.O., Alenazi, M.J.F.: Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13(5), 111 (2021)
Boros, E., Hammer, P.L., Ibaraki, T., Kogan, A.: Logical analysis of numerical data. Math. Program. 79(1–3), 163–190 (1997)
Boros, E., Hammer, P.L., Ibaraki, T., Kogan, A., Mayoraz, E., Muchnik, I.: An implementation of logical analysis of data. IEEE Trans. Knowl. Data Eng. 12(2), 292–306 (2000)
Bruni, R.: Reformulation of the support set selection problem in the logical analysis of data. Ann. Oper. Res. 150(1), 79–92 (2007)
Chauhan, S., Gangopadhyay, S.: Design of intrusion detection system based on logical analysis of data (LAD) using information gain ratio. In: Dolev, S., Katz, J., Meisels, A. (eds.) Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be’er Sheva, Israel, June 30 – July 1, 2022, Proceedings, pp. 47–65. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07689-3_4
Chauhan, S., Mahmoud, L., Gangopadhyay, S., Gangopadhyay, A.K.: A comparative study of LAD, CNN and DNN for detecting intrusions. In: Yin, H., Camacho, D., Tino, P. (eds.) Intelligent Data Engineering and Automated Learning – IDEAL 2022: 23rd International Conference, IDEAL 2022, Manchester, UK, November 24–26, 2022, Proceedings, pp. 443–455. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21753-1_43
Chikalov, I., et al.: Logical analysis of data: theory, methodology and applications. In: Chikalov, I., et al. (eds.) Three Approaches to Data Analysis: Test Theory, Rough Sets and Logical Analysis of Data, pp. 147–192. Springer, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-28667-4_3
Crama, Y., Hammer, P.L.: Boolean functions: Theory, algorithms, and applications. Cambridge University Press (2011)
Das, T.K., Gangopadhyay, S., Zhou, J.: SSIDS: semi-supervised intrusion detection system by extending the logical analysis of data. arXiv preprint arXiv:2007.10608 (2020)
Hammer, P.L.: Partially defined Boolean functions and cause-effect relationships. In: Proceedings of the International Conference on Multi-attribute Decision Making via OR-based Expert Systems. University of Passau (1986)
Hammer, P.L., Bonates, T.O.: Logical analysis of data-an overview: from combinatorial optimization to medical applications. Ann. Oper. Res. 148(1), 203–225 (2006)
Ikram, S.T., Cherukuri, A.K.: Improving accuracy of intrusion detection model using PCA and optimized SVM. J. Comput. Inf. Technol. 24(2), 133–148 (2016)
Karegowda, A.G., Manjunath, A., Jayaram, M.: Comparative study of attribute selection using gain ratio and correlation based feature selection. Int. J. Inf. Technol. Knowl. Manage. 2(2), 271–277 (2010)
Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113–125 (2023). https://doi.org/10.1016/j.comcom.2022.12.010
Oqbah Ghassan Abbas, Khaldoun Khorzom, M.A.: Machine learning based intrusion detection system for software defined networks. Int. J. Eng. Res. Technol. (IJERT) 09(9) (2020)
Pathak, A., Pathak, S.: Study on decision tree and KNN algorithm for intrusion detection system. Int. J. Eng. Res. 9(05) (2020). https://doi.org/10.17577/IJERTV9IS050303
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chauhan, S., Gangopadhyay, S., Gangopadhyay, A.K. (2024). Study of Support Set Generation Techniques in LAD for Intrusion Detection. In: Bennour, A., Bouridane, A., Chaari, L. (eds) Intelligent Systems and Pattern Recognition. ISPR 2023. Communications in Computer and Information Science, vol 1941. Springer, Cham. https://doi.org/10.1007/978-3-031-46338-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-46338-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46337-2
Online ISBN: 978-3-031-46338-9
eBook Packages: Computer ScienceComputer Science (R0)