Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nannan Lu is active.

Publication


Featured researches published by Nannan Lu.


systems man and cybernetics | 2011

An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

Shingo Mabu; Ci Chen; Nannan Lu; Kaoru Shimada; Kotaro Hirasawa

As the Internet services spread all over the world, many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class-association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. Experimental results with KDD99Cup and DARPA98 databases from MIT Lincoln Laboratory show that the proposed method provides competitively high detection rates compared with other machine-learning techniques and GNP with crisp data mining.


systems, man and cybernetics | 2012

Integrated fuzzy GNP rule mining with distance-based classification for intrusion detection system

Nannan Lu; Shingo Mabu; Tuo Wang; Kotaro Hirasawa

With the increased usage of Internet, network security attracts many researchers to propose various kinds of approaches. Data mining techniques are efficient to construct a reliable Intrusion Detection System. Classification is an essential task in data mining. In this paper, a new classification method is proposed to build an accurate and efficient classifier for intrusion detection. The new classification method utilizes the average distances of the new data to its closest neighbor points to classify it as normal or intrusion. Then, the distances of the data to the centroids of normal, misuse intrusion and anomaly intrusion is used to get the accurate class label of the data. In addition, this paper integrates Fuzzy GNP-based class association rule mining method to extract rules. Fuzzy GNP avoids the use of the domain knowledge and solves the continuous attributes efficiently. On the basis of the extracted rules, the multi-feature space is projected into a two-dimensional average matching degree space. The benchmark data KDD Cup 1999 and NSL-KDD are used to evaluate the performance of the proposed method.


congress on evolutionary computation | 2010

Classification based on a multi-dimensional probability distribution and its application to network intrusion detection

Shingo Mabu; Wenjing Li; Nannan Lu; Yu Wang; Kotaro Hirasawa

With the rapid growth of the Internet, to make sure of the computer security has been a crucial problem, therefore, many techniques for Intrusion detection have been proposed in order to detect network attacks efficiently. On the other hand, data mining algorithms based on Genetic Network Programming (GNP) have been proposed recently. GNP is a graph-based evolutionary algorithm and can extract many important class association rules by making use of the distinguished representation ability of the graph structures. In this paper, a probabilistic classification is proposed and combined with the class association rule mining of GNP, and applied to Network intrusion detection for the performance evaluation. The proposed method creates a joint probability density function of normal and intrusion accesses and use it to efficiently classify new access data into normal, known intrusion or unknown intrusion. It is clarified from the experimental results that the proposed method shows high classification accuracy compared to the method without probabilistic classification.


Journal of Advanced Computational Intelligence and Intelligent Informatics | 2011

Integrated Rule Mining Based on Fuzzy GNP and Probabilistic Classification for Intrusion Detection

Nannan Lu; Shingo Mabu; Kotaro Hirasawa


Ieej Transactions on Electrical and Electronic Engineering | 2013

An efficient class association rule‐pruning method for unified intrusion detection system using genetic algorithm

Nannan Lu; Shingo Mabu; Tuo Wang; Kotaro Hirasawa


Ieej Transactions on Electronics, Information and Systems | 2012

Distance-based Classification using Average Matching Degree and its Application to Intrusion Detection Systems

Nannan Lu; Shingo Mabu; Tuo Wang; Kotaro Hirasawa


society of instrument and control engineers of japan | 2011

A novel intrusion detection system based on the 2-dimensional space distribution of average matching degree

Tuo Wang; Shingo Mabu; Nannan Lu; Kotaro Hirasawa


society of instrument and control engineers of japan | 2010

Hybrid rule mining based on fuzzy GNP and probabilistic classification for intrusion detection

Nannan Lu; Shingo Mabu; Wenjing Li; Kotaro Hirasawa


SCIS & ISIS SCIS & ISIS 2010 | 2010

Classification Based on the Distribution of Average Matching Degree and Its Application to Network Intrusion Detection

Tuo Wang; Nannan Lu; Shingo Mabu; Wenjing Li; Kotaro Hirasawa


society of instrument and control engineers of japan | 2011

Efficient hybrid rule pruning for intrusion detection using multi-dimensional probability distribution

Nannan Lu; Shingo Mabu; Tuo Wang; Kotaro Hirasawa

Collaboration


Dive into the Nannan Lu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge