Next Article in Journal
Characteristics and Causes of Coastal Water Chemistry in Qionghai City, China
Next Article in Special Issue
DCIDS—Distributed Container IDS
Previous Article in Journal
Research Progress on the Influence of Thermo-Chemical Effects on the Swelling Pressure of Bentonite
Previous Article in Special Issue
FPGA Implementation of a Real-Time Edge Detection System Based on an Improved Canny Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection

by
Fokrul Alom Mazarbhuiya
1,* and
Mohamed Shenify
2,*
1
School of Fundamental and Applied Sciences, Assam Don Bosco University, Guwahati 782402, India
2
College of Computer Science and IT, Albaha University, Al Baha 65799, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(9), 5578; https://doi.org/10.3390/app13095578
Submission received: 31 March 2023 / Revised: 25 April 2023 / Accepted: 28 April 2023 / Published: 30 April 2023
(This article belongs to the Special Issue New Intrusion Detection Technology Driven by Artificial Intelligence)

Abstract

:
The challenging issues of computer networks and databases are not only the intrusion detection but also the reduction of false positives and increase of detection rate. In any intrusion detection system, anomaly detection mainly focuses on modeling the normal behavior of the users and detecting the deviations from normal behavior, which are assumed to be potential intrusions or threats. Several techniques have already been successfully tried for this purpose. However, the normal and suspicious behaviors are hard to predict as there is no precise boundary differentiating one from another. Here, rough set theory and fuzzy set theory come into the picture. In this article, a hybrid approach consisting of rough set theory and intuitionistic fuzzy set theory is proposed for the detection of anomaly. The proposed approach is a classification approach which takes the advantages of both rough set and intuitionistic fuzzy set to deal with inherent uncertainty, vagueness, and indiscernibility in the dataset. The algorithm classifies the data instances in such a way that they can be expressed using natural language. A data instance can possibly or certainly belong to a class with degrees of membership and non-membership. The empirical study with a real-world and a synthetic dataset demonstrates that the proposed algorithm has normal true positive rates of 91.989% and 96.99% and attack true positive rates of 91.289% and 96.29%, respectively.

1. Introduction

Anomaly detection (AD) can be termed as the detection of the patterns that deviate from the expected normal behavior [1]. Anomaly detection is essential when such abnormality in the datasets can provide sufficient system information [2]. An anomaly may be malicious activities, instrumentation errors, human errors, etc. It is an emerging research area with applications in fields such as cybersecurity, medicine, intrusion detections, financial fraud, etc. With the advancement of computers and networks and their extensive uses, organizations are becoming vulnerable to malicious activities. Although the existing defense mechanism can provide protection up to a reasonable extent, the malicious attackers are becoming more sophisticated in intruding across the networks. In the case of internal attack, it might be interesting and challenging to identify the anomalies. The detection of anomaly from network data has been accepted as one of the most promising research areas of information security.
Intrusion detection systems (IDSs) [3] are security devices for shielding networks or systems from unauthorized activity that could endanger accessibility, privacy, or integrity. Anomaly-detection-based and signature-recognition-based techniques are the two main categories of IDSs. By monitoring the systems and categorizing the actions as normal or anomalous, the former [4] is utilized to find network and computer misuse or intrusions. Anomaly-based IDS is the name given to the ensuing system [3,4]. However, a signature-recognition-based intrusion detection technique [5] uses a database of known attack signatures and raises an alarm whenever network traffic matches any signature. Usually, a computer and associated network can easily use an anomaly-based IDS as a risk mitigation technique.
Several anomaly detection approaches were developed in the previous decade [6,7,8,9,10,11]. The classification-based approach is one such approach. The classification [12] is a data processing tool to classify the items into predefined classes, and it has been applied in several areas such as pattern recognition, anomaly detection, prediction, machine vision, etc. [13,14,15,16]. An anomaly detection algorithm using neighborhood rough set classification for dataset with mixed attributes was proposed in [13]. In [14], the authors proposed a decision-tree-based approach for the detection of anomaly in the results of computer assessment to improve the quality of educational management. In [15], the authors proposed a Bayesian-network-based anomaly detection method. In [16], the authors developed a single deep RBF network, used to predict control actions and to detect hostile cyber physical system attacks. In [17], the authors presented an anomaly detection method using a rough-set-based attribute reduction. In [18], the authors introduced an anomalous event identification approach on video surveillance applications. In [19], the authors introduced a neural-network-based semi-supervised approach for efficient anomaly detection.
A problem similar to classification approach is also addressed using the clustering approach [20,21,22,23,24]. In [25], the authors proposed a complex method for detecting anomaly from real-time data using recurrence and fractal analysis. In [26], the authors made a detailed comparative analysis of five different time series models of anomaly detection. In [27], an ensemble learning model was applied to investigate and forecast outliers of the enormous system logs. In [28], the authors suggested a strategy for anomaly detection that permits the use of state-of-the-art feature selection techniques for idea representation of meta-features. A new outline focusing on data-technology-based real-time AD was proposed in [29], which uses a streaming sliding window factor corset clustering algorithm. In [30], the authors proposed a mixed clustering algorithm (MCAD) for detecting anomaly in real-time data. In [31], the authors proposed an approach called density-increasing path (DIP) to address issues of arbitrary shapes and unknown cluster numbers appearing during clustering processes.
Most of the aforesaid methods only addressed the accuracy of the anomaly detection and a few addressed the false positive rates of the methods. Since the increase in the false positive rate decreases the detection rates and thus the efficacy of any classifier, it is required to minimize the false positive rates. Again, the normal and anomalous behaviors of the system are difficult to predict as there is no precise boundary differentiating one from another. In this scenario, either fuzzy set theory or rough set theory, or the combination of both, can effectively be utilized.
L. A. Zadeh [32] introduced fuzziness in the realm of mathematics by formally defining it as a generalization of ordinary set. Atanassov [33] introduced intuitionistic fuzzy sets (IFSs) by generalizing them in terms of membership and nonmembership functions. Most of the works on anomaly detection used Zadeh’s [32] fuzzy set, and a few only used IFS. Since the IFS has the inherent ability to tackle the imbalance and overlapping data [34], it can efficiently be used to describe the uncertainty, imprecision, and vagueness in more generalized ways than the traditional fuzzy approaches [32]. Considering the strength of the intuitionistic fuzzy sets, in [35], the authors proposed an intuitionistic approach to detect anomaly from time series data. In [36], the authors proposed the formula for correlation coefficient of intuitionistic fuzzy sets whose value lies in the interval [0, 1]. Fuzzy relation, α-cut of a fuzzy relation, and fuzzy equivalence relations were introduced in [37,38].
Pawlak [39] introduced the rough set theory to deal with uncertainty, imprecision, or vagueness that exist in the datasets. Using the features of an equivalence relation, [40] nicely applied the rough-set-based classification to discrete datasets. In [41], the authors proposed an efficient method using fuzzy neighborhood rough set for the detection anomaly in large datasets. In [42], the authors proposed an efficient fuzzy-rough-set-based algorithm for feature selection. In [43,44], the authors proposed two density-based approaches using neutrosophic sets and fuzzy proximity relations for the detection anomaly. In [45], the authors proposed an NN classification algorithm which uses the fuzzy-rough lower and upper approximations to classify test objects, or to predict their decision value. The methods discussed above used the parameters such as entropy and weighted density as classification criterion for anomaly detection. However, when using correlation coefficient of intuitionistic fuzzy sets, classification rules can be generated where each data instance participating in the rules is characterized by its membership as well as non-membership values defined over a universe of discourse.
Thivagar et al. [46] introduced nano topological space with respect to a subset X of universe U in terms of lower and upper approximation of X. In [47], the authors not only introduced a nano topology structure but also applied it in medical diagnosis. In [48], the authors introduced three novel fuzzy nano topologies. Most classification-based anomaly detection algorithms developed up until today used different well-known measures to differentiate classes, and very few works were reported using the statistical measures such as correlation coefficient. Secondly, most of the fuzzy-rough approaches consider the corresponding fuzziness in Zadeh’s sense [32]. However, if the approach can be extended to the intuitionistic fuzzy set, then the detected anomalies can provide more information about the system.
In this article, a hybrid approach consisting of intuitionistic fuzzy set (IFS) and rough set (RS) was used in the classification algorithm for the anomaly detection of network datasets. The objectives of the paper are threefold.
  • First of all, a formula for correlation coefficient of IFSs is defined.
  • Secondly, using the above correlation coefficient, an α-relation (for a preassigned value of α) and an equivalence relation [49,50,51] are generated to generate two approximations.
  • Finally, a classification-based hybrid algorithm (IFRSCAD) consisting of both IFS and RS is proposed to generate the certain and possible fuzzy rules.
Furthermore, the proposed algorithm (IFRSCAD) is implemented using Matlab with two well-known datasets: KDDCUP’99 Network Anomaly Detection dataset [52] and Kinsune Network Attack dataset [53]. The classification results are compared with other classification-based methods, namely, Cuijuan et al. [17], Wang et al. [35], deep-RBF network [16], Bayes network [15], and decision tree [14]. It is found that the proposed algorithm is comparatively more efficient than others with respect to true positive rates and false positive rates. The time-complexity of the IFRSCAD is also compared with a well-known clustering-based algorithm MCAD [30] and is found to be comparatively efficient.
This paper is formatted in the following ways. The recent advances in this field are described in Section 2. The problem definition is given in Section 3. The algorithm and the flowchart explaining the system are given in Section 4. The time-complexity analysis is presented in Section 5. The experimental study and outcomes are presented in Section 6, and, lastly, the conclusions, limitations, and future directions of work are given in Section 7.

2. Related Works

AD [1] is termed as the discovery of those patterns that deviate from previously occurring ones. It can be useful for obtaining sufficient system information [2], and is one of the vital areas of modern research, which is receiving more and more attention of the researcher day by day. A couple of anomaly detection systems have already been developed [3,4]. Classification-based anomaly detection systems are some of the many. Using a classification-based labeling technique, Abdullah et al. [6] presented a method of anomaly detection in cellular networks. In [6], the authors used negative selection algorithm for detecting anomalies in multidimensional data. Taha et al. [8] reviewed the different anomaly detection methods for categorical data. Diaz Verdejo et al. [5] proposed an efficient alternative approach, named signature-recognition-based detection, in the context of web attacks.
Mazarbhuiya et al. [13] introduced a neighborhood rough-set-based classification approach to detect the anomaly in a mixed attribute dataset. For assessment of the computer and to improve the quality of educational management, a decision-tree-based anomaly detection was proposed [14]. A Bayesian-network-based algorithm for anomaly detection and offering correction hints was presented in [15]. In [16], the authors designed a single deep-RBF network to predict control actions and detect unwanted attacks in cyber physical systems. In [16], the authors proposed a rough set attribute reduction approach to detect anomaly. Wang et al. [17] designed an efficient intuitionistic fuzzy-set-based approach to detect anomaly from network traffic. Sengonul et al. [18] introduced AI-based analysis of anomaly detection in video surveillance applications. Fan et al. [19] introduced a neural-network-based semi-supervised approach for efficient anomaly detection.
Anomaly detection using a clustering approach was also studied by many researchers. Mazarbhuiya et al. [20] proposed an agglomerative hierarchical-clustering-based anomaly detection algorithm for anomaly detection in network datasets. An fuzzy c-means clustering-based anomaly detection method was proposed in [21]. Mazarbhuiya et al. [22] proposed a mixed algorithm consisting of features of both k-means and hierarchical algorithm for anomaly detection in network datasets. Retting et al. [23] proposed an algorithm of online anomaly detection in big data streams. Alguliyev et al. [24] proposed a clustering-based anomaly detection for big data. Using fractal and recurrence analysis, Alghawli et al. [25] proposed a real-time anomaly detection algorithm in time series data.
Kim et al. [26] performed a comparative analysis of five models of time series anomaly detection. In [27], the authors applied an ensemble learning model to study and predict anomaly of the enormous system logs. Halstead et al. [28] devised a strategy for anomaly detection that permitted the use of the latest feature selection techniques for idea representation of meta-features. Habeeb et al. [29] presented a data-technology-based framework focusing on real-time anomaly detection, which used a streaming sliding window factor corset clustering algorithm. Mazarbhuiya et al. [30] introduced a mixed clustering algorithm for anomaly detection of real-time data. Zhao et al. [31] proposed an efficient density-increasing path (DIP) anomaly detection approach to address arbitrary shapes and unknown cluster numbers appearing during clustering processes.
The fuzzy set was formally introduced by Zadeh [32] to deal with imprecision, uncertainty, or linguistic vagueness occurring in any dataset. Generalizing the concept of fuzzy set, Atanassov [33] defined intuitionistic fuzzy sets using membership and non-membership functions. Eulalia et al. [34] proposed an IFS-based classification on imbalance and overlapping classes to capture inherent imprecision, vagueness, and uncertainty occurring in the dataset. Wang et al. [35] proposed an intuitionistic fuzzy-set-based approach for the detection anomaly from time series data. Gerstenkorn et al. [36] proposed the definition correlation coefficient of intuitionistic fuzzy sets. Zadeh et al. [37] introduced the details of fuzzy similarity relations. In [38], the concepts of α-cut of a fuzzy relation and fuzzy equivalence relations were introduced in detail.
Rough set theory was introduced by Pawlak [39] to deal with imprecision, uncertainty, or vagueness that exist in any datasets. Using properties to equivalence relation, Nowicki et al. [40] proposed a rough-set-based classification method on discrete datasets. Maroune et al. [41] proposed an anomaly-detection-based method on a highly scalable approach to compute the nearest neighbor of objects using rough set theory. Li et al. [42] proposed an efficient fuzzy-rough-set-based approach for the feature selection. Sangeetha et al. [43,44], proposed two density approaches based on neutrosophic sets and fuzzy proximity relations for the detection anomaly. Yuan et al. [45] introduced a neural-network-based classification algorithm using the fuzzy-rough lower and upper approximations to classify test objects or to predict their decision value.
Thivagar et al. [46,47] not only proposed the structure of nanotopological space in terms of lower and upper approximation but also applied it in medical diagnosis. Shumrani et al. [48] first introduced the concept of the covering-based rough fuzzy nanotopology, the covering-based rough intuitionistic fuzzy nanotopology, and the covering-based rough neutrosophic nanotopology. In [49], the authors introduced the concept of fuzzy-rough set theory. Maji et al. [50] applied fuzzy-rough set for relevant genes selection from microarray data. Chimphlee et al. [51] proposed an anomaly-based IDS, which used fuzzy-rough clustering method. In [30], the authors conducted the experimental studies with two well-known datasets: KDDCUP’99 [52] Network Anomaly Detection dataset and Kitsune [53] Network Attack dataset.

3. Problem Definitions

Below, we present some important terms and definitions used in the paper.
Definition 1. 
Fuzzy set.
Let X = {x1, x2,… xn} be the universe of discourse. A fuzzy set [32] A on X is characterized by
A = { ( x i , μ A x i ) ; x i X , i = 1 , 2 , n }
where μ A : X [ 0 , 1 ] , the membership function, gives the grade of membership of each element x i X in A.
Definition 2. 
Intuitionistic fuzzy set.
Atanassov [33] proposed the definition of an intuitionistic fuzzy set A on X as
A = { ( x i , μ A x i , ν A x i ) ; x i X , i = 1 , 2 , n }
where μ A : X [ 0 , 1 ] and ν A : X [ 0 , 1 ] are the membership function and nonmembership function of the fuzzy set A, respectively, satisfying the condition 0 ≤ μ A ( x i ) + ν A ( x i ) ≤ 1, for every x i X .
Definition 3. 
Correlation of intuitionistic fuzzy sets.
Let A = {( x i ; μ A x i ,   ν A x i ) ; x i X , i = 1 , 2 , n } and B = {( x i ; μ B x i ,   ν B x i ) ; x i X , i = 1 , 2 , n } are two intuitionistic fuzzy sets on X = {x1, x2,… xn}. Gerstenkorn et al. [36] proposed the formula correlation coefficient as
ρ A B = i = 1 n [ μ A x i . μ B x i + ν A x i . ν B x i ] i = 1 n [ ( μ A x i ) 2 + ( ν A x i ) 2 ] i = 1 n [ ( μ B x i ) 2 + ( ν B x i ) 2 ]
Furthermore, 0 ≤ ρ A B ≤ 1.
Definition 4. 
Fuzzy relation [37,38].
For any data instances xi; i = 1, 2, … m in U, we define a fuzzy relation R on U as R = {(xi, xj); ρxixj; xi, xjU}. Since 0 ≤ ρ ≤ 1, R will be an equivalence relation.
Definition 5. 
α c u t Rα [37,38].
An α c u t Rα of a fuzzy relation R on U is a crisp set containing the elements with membership values greater than α that is
R α = { ( x ,   y ) ;   μ R x , y α ,   ( 0 ,   1 ] ,   x ,   y U }
Definition 6. 
α relation [37,38].
For any data instances xi; i = 1, 2, … m in U and 0 < α ≤ 1, the α —cut Rα of R generates α -relation (U, ρ ) as
α ( x i ) = { x ;   ρ x i x     α } .
Proposition 1. 
[37,38]
If a fuzzy relation R is an equivalence relation in max–min sense, then for α ( 0 , 1 ) , Rα possesses an equivalence relation. Therefore, any α —relation represented by an α —cut Rα will have an equivalence relation. The ordered pair (U, Rα) is an approximation space.
Definition 7. 
Fuzzy-Rough Set.
Fuzzy-rough set theory is an extension of rough set theory where the crisp equivalence class concept is extended to form fuzzy equivalence classes. Let the conditional and decision attributes of an information systems both be intuitionistic fuzzy sets and let us define an α —relation in the aforesaid manner. Since a fuzzy equivalence relation generates a fuzzy partition of the universe of discourse, the α —relation will generate a series of fuzzy equivalence classes [49,50,51], known as fuzzy knowledge granules. Letting (U, R) represent a fuzzy approximation space and X be a fuzzy subject of U intuitionistic sense, the intuitionistic fuzzy nano lower approximation, the intuitionistic fuzzy nano upper approximation, and the intuitionistic nano boundary approximation of X on (U, R) are denoted by I _ X , I ( X ) , and B I ( X ) , respectively, which are expressed as follows [48]:
I _ X = { ( x , μ R _ X x , ν R _ X x ) , y x R , x U }
I ¯ X = x , μ R ¯ X x , ν R ¯ X x , y x R , x U
B I X = I ¯ X I _ X
where μ R _ X x = i n f y x R ( y ) , ν R _ X x = s u p y x R ( y ) , μ R ¯ X x = s u p y x R ( y ) , and ν R ¯ X x = i n f y x R ( y ) .

4. Proposed Algorithm

For generating classification rules, we choose a suitable value of the correlation coefficient (α) to define the α-relation. The correlation coefficient used to define the relation is given in Section 3. The procedure of finding classification rules is given as follows. We have a collection of m-data instances, each of which is described by n-intuitionistic fuzzy attributes and is represented as an intuitionistic fuzzy matrix [54], where each entry is <xij, yij>, xij ∈ [0, 1], yij ∈ [0, 1], and 0 ≤ xij + yij ≤ 1, I = 1, 2, … m and j = 1, 2, … n. Usually, the dataset can be expressed as an information system (U, CD), where C and D are conditional and decision attributes, respectively, and are expressed as intuitionistic fuzzy sets. The method is described below.
The first step of the proposed method is to compute α-relation of the conditional attribute using correlation coefficient, and compute the equivalence classes of decision attributes using the same formula of the correlation coefficient. The value of α is taken to be 0.4. Then, the “infimum” operator is applied on fuzzy knowledge granules of conditional attributes. Then, intuitionistic fuzzy nano lower approximation and intuitionistic fuzzy nano upper approximation are constructed using decision class. Then, the boundary regions are also found. With the help of two approximations, two sets of fuzzy rules, namely, the certain fuzzy rules and possible fuzzy rules, can be generated. The proposed method is also explained with the help of the flowchart given in Figure 1 below.
The pseudocode for the algorithm is given as follows.
Algorithm 1: IFRSCAD
1: Input (U, CD), α//C, the conditional fuzzy attributes, D, the decision fuzzy attributes
2: Step1. Create α-relation on C using correlation coefficient.
3: Step2. Create the fuzzy equivalence relation for D.
4: Step3. Apply ‘infimum’ operator on the fuzzy granules of records of U brought up by C.
5: Step4. Construct separately nano lower approximation space ( I _ X ) Nano upper approximation space I ¯ X for D and the result of fuzzy granules after applying ‘infimum’ to C.
6: Step5. Find boundary regions.
7: Step6. Generate certain fuzzy rules from nano lower approximation space, possible fuzzy rules from nano upper approximation, and boundary rules from boundary region.
Obviously, each rule generated by the system is fuzzy in the intuitionistic sense. That is, attributes contributing in any of the rules will be in the intuitionistic fuzzy set.

5. Complexity Analysis

To generate α-relation, the algorithm needs to choose all possible pairs of data instances from U, compute their correlation coefficients, then compare these with α. These are performed in (½ |U|C2.|C| + ½ |U|C2), where (½ |U|C2) computation is required for choosing pairs of data instances, |C| is required for computation correlation coefficients, and (½ |U|C2) number of comparisons with α are required. Thus, the running cost of step 1 is O(m2.n), where |U| = m and |C| = n. For generating equivalence relation for D, the algorithm needs to take all possible pairs of data instances and compute the correlations, and this can be performed in (½ |U|C2.|C|). The running cost for step 2 is O(m2.n). Thus, the running cost of step 1 and step 2 is O(m2.n + m2.n) = O(m2.n). The running cost for step 3 is O(m). For generating the nano topology, the lower approximation, upper approximation, and boundary regions of the set have to be generated, which takes the computational time of O(|X|.|U|). Therefore, the total cost from step 1 to step 5 is O(m2.n + m + |X|.|U|) = O(m2.n), which is the worst-case complexity. Step 6 takes constant time. Therefore, the overall time-complexity of the proposed algorithm is O(m2.n), which shows that the proposed algorithm is quite efficient.

6. Experimental Analysis and Results

6.1. Datasets

KDDCUP’99 [52]: It is a synthetic dataset that simulates intrusion in the military network environment. The data are collected for 9 weeks, and the training data consist of 5000 thousand network connections. The attributes can be divided into the classes, viz., normal (unauthorized access to local super user privileges, unauthorized access from a remote machine), dos, and probe.
Kitsune [53]: It is a group of nine network attack datasets, each containing millions of network packets and different cyberattacks, that were either gathered from an IP-based commercial surveillance system or a network of IoT devices.
The above datasets were acquired through the UCI machine repository. A brief description of the datasets is given in Table 1.

6.2. Experimental Results and Analysis

The experiments were carried out in Matlab with Intel Core i7-2600 machine with 3.4 GHz, 8 MB Cache, 8 GB RAM, and 500 GB hard disc, running Windows 10, and the outcomes were analyzed with five prominent classification-based methods, namely, Cuijuan et al.’s algorithm [17], Wang et al.’s algorithm [35], deep-RBF network [16], Bayes network [15], and decision tree [14]. The classifiers were built using the aforesaid dataset. The value of α was assumed to be 0.4. The classifiers were then used to categorize any new instance as either normal traffic or an attack. For a variety of attributes sizes, the outcomes of all the aforesaid six methods were recorded. Data instances from various attacks were significantly out of proportion to normal data. Parameters such as true positive rate (TPR) and false positive rate (FPR) were utilized to estimate the effectiveness of the approaches and comparative analysis. A partial view of the results of the six algorithms describing the comparative analysis of normal true positive rate, attack true positive rate, normal false positive rate, and attack false positive rate for different sizes of attribute sets of the KDDCUP’99 dataset [52] is presented in Table 2 and Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7, respectively.
The bar diagram of Figure 2 represents the percentage of normal true positive rate of six different algorithms, namely, Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD for different attribute sizes, say 10, 20, and 41 of the dataset KDDCUP’99 [52]. Here, each colored bar represents one algorithm’s percentage of normal true positive rates.
The bar diagram of Figure 3 represents the percentages of attack true positive rate of six aforesaid algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the dataset KDDCUP’99 [52].
The bar diagram of Figure 4 represents the percentages of normal false positive rates of aforesaid algorithms for different attribute sizes of the dataset KDDCUP’99 [52].
Again the bar diagram of Figure 5 represents the percentages of the attack false positive rates of the aforesaid six algorithms for different attribute sizes of the dataset KDDCUP’99 [52].
Again, the bar diagram of Figure 6 represents the percentages of the average true positive rate of the aforesaid six algorithms for different attribute sizes of KDDCUP’99 [52].
Again, the bar diagram of Figure 7 represents the percentage of average false positive rate of the aforesaid six algorithms for different attribute sizes of the dataset KDDCUP’99 [52].
Similarly, a partial view of the results of the six algorithms describing the comparative analysis of normal true positive rate, attack true positive rate, normal false positive rate, and attack false positive rate for different sizes of attribute set of the Kitsune dataset [53] is presented in Table 3 and Figure 8, Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13, respectively.
The bar diagram of Figure 8 represents the percentages of normal true positive rate of the aforesaid six algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes, say 10, 25, 50, 100, and 41 of the dataset Kitsune [53]. Similarly, each colored bar represents one algorithm’s percentage of normal true positive rates.
The bar diagram of Figure 9 represents the percentages of the attack true positive rate of six aforesaid algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the dataset Kinsune [53].
The bar diagram of Figure 10 represents the percentages of normal false positive rates of the six aforesaid algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the dataset Kitsune [53].
The bar diagram of Figure 11 represents the percentages of attack false positive rates of the six aforesaid algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the Kitsune dataset [53].
The bar diagram of Figure 12 represents the percentages of average true positive rates of the aforesaid six algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the dataset Kitsune [53].
Again, the bar diagram of Figure 13 represents the percentages of average true positive rates of the aforesaid six algorithms (Wang et al.’s algorithm [35], Cuijuan et al.’s algorithm [17], deep-RBF network [16], Bayes network [15], decision tree [14], and IFRSCAD) for different attribute sizes of the dataset Kitsune [53].
The following observations can be drawn from the above tables and bar diagrams.
  • The decision-tree-based algorithm [14] has the poorest detection rate. It has 71.31–66.49% of normal TPR, 67.44–62.23% of attack TPR, 29.69–33.51% of normal FPR, and 32.56–37.71% of attack FPR for ascending order of attribute sizes (from 10–41) of the dataset KDDCUP’99 [52]. Similarly, it has 71.31–50.12% of normal TPR, 67.44–49.34% of attack TPR, 28.69–49.88% of normal FPR, and 32.56–50.56% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53]. It shows that the algorithm has the poorest performances, which decreases with the increase in dimension size of the dataset.
  • The deep-RBF-network-based algorithm [16] is better than the decision-tree-based algorithm [14] and it has 94.25–90.25% of normal TPR, 90.23–85.25% of attack TPR, 5.75–9.75% of normal FPR, and 9.75–14.75% of attack FPR for ascending order of attribute sizes (from 10–41) of the dataset KDDCUP’99 [52]. Similarly, it has 94.25–81.21% of normal TPR, 93.11–80.56% of attack TPR, 5.75–18.79% of normal FPR, and 6.89–19.44% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53].
  • The Bayes-network-based algorithm [15] is better than the decision-tree-based algorithm [14] and the deep-RBF-network-based algorithm [16] in terms of detection rates. It has 95.87–93.13% of normal TPR, 90.87–83.49% of attack TPR, 4.13–6.87% of normal FPR, and 9.136–16.51% of attack FPR for ascending order of attribute sizes (from 10–41) of the dataset KDDCUP’99 [52]. Similarly, it has 95.87–80.55% of normal TPR, 94.8–79.53% of attack TPR, 4.13–19.45% of normal FPR, and 5.20–20.47% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53]. Although the algorithm is quite efficient, its performance decreases with the increase in the dimension of the datasets.
  • Cuijuan et al.’s algorithm [17] is better than all the previous three algorithms as far as detection rate is concerned. It has 97.75–93.25% of normal TPR, 95.25–89.25% of attack TPR, 3.20–5.80% of normal FPR, and 4.25–10.75% of attack FPR for ascending order of attribute sizes (from 10–41) of the dataset KDDCUP’99 [52]. Similarly, it has 95.95–82.32% of normal TPR, 95.75–81.42% of attack TPR, 4.05–18.232% of normal FPR, and 4.25–18.58% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53]. Its performance also decreases proportionately with the increase in the dimension of the datasets.
  • Wang et al.’s algorithm [35] is the most efficient in comparison with all the aforesaid algorithms. It has 98.21–96.25% of normal TPR, 96.21–93.25% of attack TPR, 2.12–3.02% of normal FPR, and 3.79–6.75% of attack FPR for ascending order of attribute sizes (from 10–42) of the dataset KDDCUP’99 [52]. Similarly, it has 98.21–90.44% of normal TPR, 96.21–89.33% of attack TPR, 1.79–9.56% of normal FPR, and 3.79–10.67% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53]. Its performance also decreases proportionately with the increase in the dimension of the datasets.
  • The proposed algorithm (IFRSCAD) has 98.342–96.99% of normal TPR, 98.04–96.29% of attack TPR, 1.658–3.01% of normal FPR, and 1.96–3.71% of attack FPR for ascending order of attribute sizes (from 10–42) of the dataset KDDCUP’99 [52]. Similarly, it has 98.342–91.989% of normal TPR, 98.04–91.289% of attack TPR, 1.658–8.011% of normal FPR, and 1.96–8.711% of attack FPR for ascending order of attribute sizes (from 10–115) of the dataset Kitsune [53]. Its performance also decreases proportionately with the increase in the dimension of datasets. It is clear from the data that the proposed algorithm has more TPR and less FPR. The difference between normal TPR and attack TPR and normal FPR and attack FPR is also less in comparison with other methods. The performance decrement is less with the increase in dimensions. Obviously, the IFRSCAD has more average TPR and less average FPR than others.
  • In addition, the execution time of the IFRSCAD depends upon two factors, namely, dimension and size of the datasets. It was found that if the dimension is kept constant, the algorithm has quadratic execution time, whereas if the data size is kept constant, it runs in linear time. Therefore, the proposed algorithm’s time complexity is more dependent on the data size than the number of attributes. The time-complexity graphs for constant dimension and constant data size are given, respectively, in Figure 14 and Figure 15.
Furthermore, the IFRSCAD’s time-complexity is also analyzed against that of MCAD [30]. If the dimension of the dataset is assumed to be constant, the MCAD [30] runs in cubic time and IFRSCAD runs in quadratic time. Thus for large data size, the IFRSCAD outperforms MCAD [30]. The comparative analysis is presented graphically in Figure 16 below.

7. Conclusions, Limitations, and Lines for Future Work

7.1. Conclusions

In this article, a hybrid algorithm consisting of both rough set and fuzzy set theoretic approaches is presented for the detection of anomaly. The algorithm is a classification-based algorithm which uses rough set and intuitionistic fuzzy set to deal with uncertainty in the dataset. The obtained rules can be expressed using intuitionistic fuzzy sets. The algorithm generates certain rules from lower approximation space, possible rules from upper approximation space, and boundary rules from boundary regions. Each attribute contributing in a rule can be expressed in terms of its membership value and non-membership value. In addition, an attribute can contribute in both the certain rules as well as the possible rules. Therefore, each rule obtained by the algorithm is expressed using intuitionistic fuzzy set. The algorithm is named IFRSCAD. The proposed algorithm’s performance is demonstrated by experimental analysis, and using the datasets KDDCUP’99 [52] and Kitsune [53], the algorithm extract anomalies with the accuracy of 96.99% and 91.989%, respectively. The comparative analysis shows that the proposed algorithm outperforms a couple of well-known classification-based algorithms.
Finally, the proposed algorithm’s time-complexity is found to be less dependent on dimension of the dataset and, rather, more on the size of the datasets. However, the detection rate depends more on dimensions, as evident from the obtained results. The proposed algorithm’s time-complexity is compared with a clustering-based algorithm MCAD [30], and under the assumption of constant dimension, the algorithm is found to be more efficient than MCAD [30].

7.2. Limitations and Lines for Future Work

Though the proposed algorithm performs very well, it has some limitations. Firstly, although the run time of the proposed algorithm is less dependent on dimension of the dataset, it detection rate decreases proportionately with the increase in dimension. Secondly, the algorithm lacks efficacy in dealing with continuous data, as rough set cannot handle continuous data, and finding the correlation coefficient of continuous data would be difficult. Finally, the algorithm in its current form is inefficient to deal with real-time data.
Future works can be possible along the following lines:
  • An effective method can be designed for anomaly detection in high-dimensional data.
  • An effective method can be designed for anomaly detection from datasets with continuous attributes.
  • An effective method can be designed for real-time anomaly from heterogeneous data.

Author Contributions

Conceptualization, F.A.M.; Methodology, F.A.M.; Software, F.A.M., M.S.; Validation, F.A.M., M.S.; Formal Analysis, F.A.M.; Investigation, F.A.M., M.S.; Resource, F.A.M., M.S.; Data Curation, F.A.M., M.S.; Writing—original draft preparation, F.A.M., M.S.; writing—review and editing, F.A.M., M.S.; visualization, F.A.M.; supervision, F.A.M.; project administration, M.S., F.A.M.; funding acquisition, M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data, code, and other materials can be made available on request.

Conflicts of Interest

There are no conflict of interest or competing interests among the authors. All the authors have agreed to publish the paper in this journal.

References

  1. Kumar, V.; Banejee, A.; Chandola, V. Anomaly detection: A survey. ACM Comput. Surv. 2009, 41, 1–58. [Google Scholar]
  2. Hodge, V.; Austin, J. A survey of outlier detection methodologies. Artif. Intell. Rev. 2004, 22, 85–126. [Google Scholar] [CrossRef]
  3. Jyothsna, V.; Prasad, K.M. Anomaly-Based Intrusion Detection System. In Computer and Network Security; BoD – Books on Demand: Paris, France, 2019; pp. 1–15. [Google Scholar]
  4. Jabez, J.; Muthikumar, B. Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach. Procedia Comput. Sci. 2015, 48, 338–346. [Google Scholar] [CrossRef]
  5. Díaz-Verdejo, J.; Muñoz-Calle, J.; Estepa Alonso, A.; Estepa Alonso, R.; Madinabeitia, G. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks. Appl. Sci. 2022, 12, 852. [Google Scholar] [CrossRef]
  6. Al Mamun, S.M.A.; Valimaki, J. Anomaly Detection and Classification in Cellular Networks Using Automatic Labeling Technique for Applying Supervised Learning. Procedia Comput. Sci. 2018, 140, 186–195. [Google Scholar] [CrossRef]
  7. Dasgupta, D.; Majumdar, N.S. Anomaly detection in multidimensional data using negative selection algorithm. In Proceedings of the 2002 Congress on Evolutionary Computation, CEC, Honolulu, HI, USA, 12–17 May 2002; Volume 2, pp. 1039–1044. [Google Scholar]
  8. Taha, A.; Hadi, A.S. Anomaly Detection Methods for Categorical Data: A Review. ACM Comput. Surv. 2019, 52, 1–35. [Google Scholar] [CrossRef]
  9. Liu, Y.; Wang, H.; Zhang, X.; Tian, L. An efficient framework for unsupervised anomaly detection over edge-assisted internet of things. ACM Trans. Sens. Netw. 2023; just accepted. [Google Scholar] [CrossRef]
  10. Mozaffari, M.; Doshi, K.; Yilmaz, Y. Self-Supervised Learning for Online Anomaly Detection in High-Dimensional Data Streams. Electronics 2023, 12, 1971. [Google Scholar] [CrossRef]
  11. Angiulli, F.; Fassetti, F.; Serrao, C. Anomaly detection with correlation laws. Data Knowl. Eng. 2023, 145, 102181. [Google Scholar] [CrossRef]
  12. Pujari, A.K. Data Mining Techniques; University Press (India) Pvt. Ltd.: Telangana, India, 2001. [Google Scholar]
  13. Mazarbhuiya, F.A. Detecting Anomaly using Neighborhood Rough Set based Classification Approach. ICIC Express Lett. 2023, 17, 73–80. [Google Scholar]
  14. Panasov, V.L.; Nechitaylo, N.M. Decision Trees-based Anomaly Detection in Computer Assessment Results. J. Phys. Conf. Ser. 2021, 2001, 012033. [Google Scholar] [CrossRef]
  15. Dufraisse, E.; Leray, P.; Nedellec, R.; Benkhelif, T. Interactive Anomaly Detection in Mixed Tabular Data Using Bayesian Networks. In Proceedings of the 10th International Conference on Probabilistic Graphical Models (PGM 2020), Aalborg, Denmark, 23–25 September 2020. [Google Scholar]
  16. Burruss, M.; Ramakrishna, S.; Dubey, A. Deep-RBF Networks for Anomaly Detection in Automotive Cyber-Physical Systems. Auton. Driv. Assur. Auton. 2021, 55–60. [Google Scholar] [CrossRef]
  17. Liu, C.; Li, Y.; Qin, Y. Research on Anomaly Intrusion Detection Based on Rough Set Attribute Reduction. In Proceedings of the 2nd International Conference on Computer Application and System Modeling (2012), Paris, France, 27–29 July 2012; Atlantis Press: Amsterdam, The Netherlands; pp. 607–610. [Google Scholar]
  18. Şengönül, E.; Samet, R.; Abu Al-Haija, Q.; Alqahtani, A.; Alturki, B.; Alsulami, A.A. An Analysis of Artificial Intelligence Techniques in Surveillance Video Anomaly Detection: A Comprehensive Survey. Appl. Sci. 2023, 13, 4956. [Google Scholar] [CrossRef]
  19. Fan, Z.; Wang, G.; Zhang, K.; Liu, S.; Zhong, T. Semi-Supervised Anomaly Detection via Neural Process. IEEE Trans. Knowl. Data Eng. 2023, 1–13. [Google Scholar] [CrossRef]
  20. Mazarbhuiya, F.A.; AlZahrani, M.Y.; Georgieva, L. Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm. In ICISA 2018; Lecture Notes on Electrical Engineering (LNEE); Springer: Hong Kong, China, 2019; Volume 514, pp. 475–484. [Google Scholar]
  21. Linquan, X.; Wang, W.; Liping, C.; Guangxue, Y. An Anomaly Detection Method Based on Fuzzy C-means Clustering Algorithm. In Proceedings of the Second International Symposium on Networking and Network Security, Jinggangshan, China, 2–4 April 2010; pp. 089–092. [Google Scholar]
  22. Mazarbhuiya, F.A.; AlZahrani, M.Y.; Mahanta, A.K. Detecting Anomaly Using Partitioning Clustering with Merging. ICIC Express Lett. 2020, 14, 951–960. [Google Scholar]
  23. Retting, L.; Khayati, M.; Cudre-Mauroux, P.; Piorkowski, M. Online anomaly detection over Big Data streams. In Proceedings of the 2015 IEEE International Conference on Big Data, Santa Clara, CA, USA, 29 October–1 November 2015. [Google Scholar]
  24. Alguliyev, R.; Aliguliyev, R.; Sukhostat, L. Anomaly Detection in Big Data based on Clustering. Stat. Optim. Inf. Comput. 2017, 5, 325–340. [Google Scholar] [CrossRef]
  25. Alghawli, A.S. Complex methods detect anomalies in real time based on time series analysis. Alex. Eng. J. 2022, 61, 549–561. [Google Scholar] [CrossRef]
  26. Kim, B.; Alawami, M.A.; Kim, E.; Oh, S.; Park, J.; Kim, H. A Comparative Study of Time Series Anomaly Detection, Models for Industrial Control Systems. Sensors 2023, 23, 1310. [Google Scholar] [CrossRef]
  27. Wang, B.; Hua, Q.; Zhang, H.; Tan, X.; Nan, Y.; Chen, R.; Shu, X. Research on anomaly detection and real-time reliability evaluation with the log of cloud platform. Alex. Eng. J. 2022, 61, 7183–7193. [Google Scholar] [CrossRef]
  28. Halstead, B.; Koh, Y.S.; Riddle, P.; Pechenizkiy, M.; Bifet, A. Combining Diverse Meta-Features to Accurately Identify Recurring Concept Drit in Data Streams. ACM Trans. Knowl. Discov. Data, 2023; just accepted. [Google Scholar]
  29. Habeeb, R.A.A.; Nasauddin, F.; Gani, A.; Hashem, I.A.T.; Amanullah, A.M.E.; Imran, M. Clustering-based real-time anomaly detection—A breakthrough in big data technologies. Trans. Emerg. Telecommun. Technol. 2022, 33, e3647. [Google Scholar]
  30. Mazarbhuiya, F.A.; Shenify, M. A Mixed Clustering Approach for Real-Time Anomaly Detection. Appl. Sci. 2023, 13, 4151. [Google Scholar] [CrossRef]
  31. Zhao, J.; Deng, F.; Zhu, J.; Chen, J. Searching Density-increasing Path to Local Density Peaks for Unsupervised Anomaly Detection. IEEE Trans. Big Data 2023, 1–12. [Google Scholar] [CrossRef]
  32. Zadeh, L.A. Fuzzy Sets as Basis of Theory of Possibility. Fuzzy Sets Syst. 1978, 1, 3–28. [Google Scholar] [CrossRef]
  33. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  34. Eulalia, S.; Kukier, M. Atanassov’s Intuitionistic Fuzzy Sets in Classification of Imbalanced and Overlapping Classes. Intell. Tech. Tools Nov. Syst. Archit. 2008, 109, 455–471. [Google Scholar] [CrossRef]
  35. Wang, J.; Zhao, H.; Xu, J.; Li, H.; Zhu, H.; Chao, S.; Zheng, C. Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic from Flow Interaction. IEEE Access 2018, 6, 596–601. [Google Scholar] [CrossRef]
  36. Gerstenkorn, T.; Manko, J. Correlation of Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1991, 44, 39–43. [Google Scholar] [CrossRef]
  37. Zadeh, L.A. Similarity relations and fuzzy orderings. Inf. Sci. 1971, 3, 177–200. [Google Scholar] [CrossRef]
  38. Kannan, S.R.; Mohapatra, R.K. New notions for fuzzy equivalence using α-cut relation. IOP Conf. Ser. J. Phys. Conf. Ser. 2019, 1344, 012040. [Google Scholar] [CrossRef]
  39. Pawlak, Z. Rough sets. Int. J. Comput. Inf. Sci. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  40. Robert, R. Nowicki, Rough Set Based Classification Systems; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
  41. Maroune, E.L.M.; Elhoussaine, Z. A fuzzy neighborhood rough set method for anomaly detection in large scale data. Int. J. Artif. Intell. 2020, 9, 1–10. [Google Scholar] [CrossRef]
  42. Li, Y.; Wei, S.; Liu, X.; Zhang, Z. A Novel Robust Fuzzy Rough Set Model for Feature Selection. Conplexity Hindawi 2021, 2021, 1–12. [Google Scholar] [CrossRef]
  43. Sangeetha, T.; Mary Amlanathan, G. Outlier detection in neutrosophic sets by using rough entropy based weighted density method. CAAI Trans. Intell. Technol. 2020, 5, 121–127. [Google Scholar] [CrossRef]
  44. Sangeetha, T.; Mary Amlanathan, G. A fuzzy proximity relation approach for outlier detection in the mixed dataset by using rough entropy-based weighted density method. Soft Comput. Lett. 2021, 3, 100027. [Google Scholar] [CrossRef]
  45. Yuan, Z.; Chen, B.; Liu, J.; Chen, H.; Peng, D.; Li, P. Anomaly detection based on weighted fuzzy-rough density. Appl. Soft Comput. 2023, 134, 109995. [Google Scholar] [CrossRef]
  46. Thivagar, M.L.; Richard, C. On nano forms of weakly open sets. Int. J. Math. Stat. Invent. 2013, 1, 31–37. [Google Scholar]
  47. Thivagar, M.L.; Priyalatha, S.P.R. Medical diagnosis in an indiscernibility matrix based on nano topology. Cogent Math. 2017, 4, 1–9. [Google Scholar]
  48. Al Shumrani, M.A.; Topal, S.; Smarandache, F.; Ozel, C. Covering-Based Rough Fuzzy, Intuitionistic Fuzzy and Neutrosophic Nano Topology and Applications. IEEE Access 2019, 7, 172839–172846. [Google Scholar] [CrossRef]
  49. Dubois, D.; Prade, H. Rough fuzzy sets and fuzzy rough sets. Int. J. Gen. Syst. 1990, 17, 191–209. [Google Scholar] [CrossRef]
  50. Maji, P.; Pal, S. Fuzzy–Rough Sets for Information Measures and Selection of Relevant Genes from Microarray Data. IEEE Trans. Syst. Man Cybern.—Part B Cybern. 2009, 40, 741–752. [Google Scholar] [CrossRef]
  51. Chimphlee, W.; Abdulla, H.; Noor, M.H.M.; Srinoy, S. Anomaly-based intrusion detection using Fuzzy-Rough Clustering. In Proceedings of the 2006 International Conference on Hybrid Information Technology; Washington, DC, USA, 9–11 November 2006, IEEE Explore: Piscataway, NJ, USA, 2006. [Google Scholar]
  52. KDD Cup’99 Data. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 15 January 2020).
  53. Kitsune Network Attack Dataset. Available online: https://github.com/ymirsky/Kitsune-py (accessed on 12 December 2021).
  54. Eman, E.G. An operation on intuitionistic Fuzzy Matrices. Filomat 2020, 34, 79–88. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the algorithm.
Figure 1. Flowchart of the algorithm.
Applsci 13 05578 g001
Figure 2. Comparative analysis of normal true positive rates of different algorithms with KDDCUP’99.
Figure 2. Comparative analysis of normal true positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g002
Figure 3. Comparative analysis of attack true positive rates of different algorithms with KDDCUP’99.
Figure 3. Comparative analysis of attack true positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g003
Figure 4. Comparative analysis of normal false positive rates of different algorithms with KDDCUP’99.
Figure 4. Comparative analysis of normal false positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g004
Figure 5. Comparative analysis of attack false positive rates of different algorithms with KDDCUP’99.
Figure 5. Comparative analysis of attack false positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g005
Figure 6. Comparative analysis of average true positive rates of different algorithms with KDDCUP’99.
Figure 6. Comparative analysis of average true positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g006
Figure 7. Comparative analysis of average false positive rates of different algorithms with KDDCUP’99.
Figure 7. Comparative analysis of average false positive rates of different algorithms with KDDCUP’99.
Applsci 13 05578 g007
Figure 8. Comparative analysis of normal true positive rates of different algorithms with Kitsune [53].
Figure 8. Comparative analysis of normal true positive rates of different algorithms with Kitsune [53].
Applsci 13 05578 g008
Figure 9. Comparative analysis of attack true positive rates of different algorithms using Kitsune.
Figure 9. Comparative analysis of attack true positive rates of different algorithms using Kitsune.
Applsci 13 05578 g009
Figure 10. Comparing analysis of normal false positive rates of different algorithms with Kitsune.
Figure 10. Comparing analysis of normal false positive rates of different algorithms with Kitsune.
Applsci 13 05578 g010
Figure 11. Comparing analysis of attack false positive rates of different algorithms with Kitsune.
Figure 11. Comparing analysis of attack false positive rates of different algorithms with Kitsune.
Applsci 13 05578 g011
Figure 12. Comparing analysis of average true positive rates of different algorithms with Kitsune.
Figure 12. Comparing analysis of average true positive rates of different algorithms with Kitsune.
Applsci 13 05578 g012
Figure 13. Comparing analysis of average false positive rates of different algorithms with Kitsune.
Figure 13. Comparing analysis of average false positive rates of different algorithms with Kitsune.
Applsci 13 05578 g013
Figure 14. Execution time of IFRSCAD for different dimensions (n).
Figure 14. Execution time of IFRSCAD for different dimensions (n).
Applsci 13 05578 g014
Figure 15. Execution time of IFRSCAD for different data sizes (m).
Figure 15. Execution time of IFRSCAD for different data sizes (m).
Applsci 13 05578 g015
Figure 16. Comparative analysis of execution time of MCAD [30] and IFRSCAD.
Figure 16. Comparative analysis of execution time of MCAD [30] and IFRSCAD.
Applsci 13 05578 g016
Table 1. Dataset descriptions.
Table 1. Dataset descriptions.
DatasetDataset CharacteristicsAttribute CharacteristicsNo. of InstancesNo. of Attributes
KDDCUP’99 Network Anomaly Detection dataset [44]MultivariateNumeric, categorical, temporal4,898,43141
Kitsune Network Attack dataset [45]Multivariate, sequential, time seriesReal, temporal27,170,754115
Table 2. Normal vs. attack TPR/FPR using KDDCUP’99 [52].
Table 2. Normal vs. attack TPR/FPR using KDDCUP’99 [52].
AlgorithmNo. of
Attributes
Normal TPRAttack TPRNormal FPRAttack FPRAvg. TPRAvg. FPR
IFRSCAD410.96990.96290.030100.037100.96640.03360
200.979990.97890.020100.021100.9744450.02060
100.983420.98040.016580.019600.981910.01809
Wang et al. [35]410.96250.93250.03020.06750.94750.04885
200.97450.94150.03120.05850.95800.04485
100.98210.96210.02120.03790.97210.02955
Cuijuan et al. [17]410.93250.89250.05800.10750.91750.08275
200.94450.92450.05400.07550.93450.06475
100.97750.95750.03200.04250.96750.03725
Deep-RBF network410.90250.85250.09750.14750.87750.12250
200.92120.88120.07880.11880.90120.09880
100.94250.90230.05750.09750.92250.07750
Bayes network410.93130.83490.06870.16510.88310.11690
200.94290.87200.05710.13280.90750.09255
100.95870.90870.04130.09130.93370.05215
Decision tree410.66490.62230.33510.37710.64360.35610
200.68290.65200.31710.34800.67790.33255
100.71310.67440.29690.32560.693750.31125
Table 3. Normal vs. attack TPR/FPR using Kitsune [53].
Table 3. Normal vs. attack TPR/FPR using Kitsune [53].
AlgorithmNo. of
Attributes
Normal TPRAttack TPRNormal FPRAttack FPRAvg. TPRAvg. FPR
IFRSCAD1150.919890.912890.080110.087110.916390.08361
1000.927660.920660.072340.079340.924160.07584
500.9679 0.951160.041100.048840.954530.04497
250.969990.966780.030100.033220.9683850.03166
100.983420.98040.016580.01960.981910.01809
Wang et al. [35]1150.90440.89330.09560.10670.898850.10115
1000.92770.91890.07230.08110.92330.1534
500.96250.94250.03750.05750.95250.0475
250.97450.95450.02550.04550.96450.0355
100.98210.96210.01790.03790.97210.0279
Cuijuan et al. [17]1150.82320.81420.182320.18580.81870.06703
1000.86330.86210.13670.13790.86270.1373
500.90250.90110.09750.09890.90180.0982
250.94450.93450.05550.06450.93950.0600
100.95950.95750.04050.04250.95850.0415
Deep-RBF network1150.81210.80560.18790.19440.08850.19115
1000.84110.83520.15890.16480.838150.16185
500.90250.89330.09750.10670.89790.1021
250.92120.91020.07880.08980.91570.0843
100.94250.93110.05750.06890.93680.07750
Bayes network1150.80550.79530.19450.20470.80040.1996
1000.84320.83420.15680.16580.83870.1613
500.93130.93490.06870.06510.93310.0669
250.94290.94200.05710.05800.942450.05755
100.95870.94800.04130.05200.953350.04665
Decision tree1150.50120.49340.49880.50560.49730.5027
1000.54340.53450.45660.46550.538950.46105
500.64490.63230.35510.36770.63860.3614
250.67290.66290.32710.33710.66790.3321
100.71310.67440.28690.32560.693750.30625
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mazarbhuiya, F.A.; Shenify, M. An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection. Appl. Sci. 2023, 13, 5578. https://doi.org/10.3390/app13095578

AMA Style

Mazarbhuiya FA, Shenify M. An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection. Applied Sciences. 2023; 13(9):5578. https://doi.org/10.3390/app13095578

Chicago/Turabian Style

Mazarbhuiya, Fokrul Alom, and Mohamed Shenify. 2023. "An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection" Applied Sciences 13, no. 9: 5578. https://doi.org/10.3390/app13095578

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop