<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
		<Article>
		<Journal>
			<PublisherName>Majlesi Journal of Electrical Engineering</PublisherName>
			<JournalTitle>Intrusion Detection Based on Rule Extraction from Dynamic Cell Structure Neural Networks</JournalTitle>
			<Issn></Issn>
			<Volume>Volume 4 (2010)</Volume>
			<Issue>Issue 4, December 2010</Issue>
			<PubDate PubStatus="epublish">
                <Year>2024</Year>
                <Month>02</Month>
                <Day>26</Day>
			</PubDate>
		</Journal>
		<ArticleTitle>Intrusion Detection Based on Rule Extraction from Dynamic Cell Structure Neural Networks</ArticleTitle>
		<VernacularTitle></VernacularTitle>
		<FirstPage></FirstPage>
		<LastPage></LastPage>
		<ELocationID EIdType="doi">10.1234/mjee.v4i4.107</ELocationID>
		<Language>EN</Language>
		<AuthorList>
            			<Author>
                				<FirstName>Mansour</FirstName>
				<LastName>Sheikhan</LastName>
				<Affiliation>Department of Communication Engineering, South Tehran Branch,  Islamic Azad University, Tehran, Iran</Affiliation>
				<Identifier Source="ORCID"></Identifier>
			</Author>
            			<Author>
                				<FirstName>Amir</FirstName>
				<LastName>Khalili</LastName>
				<Affiliation></Affiliation>
				<Identifier Source="ORCID"></Identifier>
			</Author>
            		</AuthorList>
		<PublicationType>Journal Article</PublicationType>
		<History>
			<PubDate PubStatus="received">
				<Year>2024</Year>
				<Month>02</Month>
				<Day>26</Day>
			</PubDate>
		</History>
		<Abstract>Knowledge embedded within artificial neural networks (ANNs) is distributed over the connections and weights of neurons. So, the user considers ANN as a black box system. There are many researches investigating the area of rule extraction by ANNs. In this paper, a dynamic cell structure (DCS) neural network and a modified version of LERX algorithm are used for rule extraction. On the other hand, intrusion detection system (IDS) is known as a critical technology to secure computer networks. So, the proposed algorithm is used to develop an IDS and classify the patterns of intrusion. To compare the performance of the proposed system with other machine learning algorithms, a multi layer perceptron (MLP) and an Elman neural network are employed with selected inputs based on the results of a feature relevance analysis. Empirical results show the superior performance of the IDS based on rule extraction from DCS in recognizing hard-detectable attack categories, e.g. user-to-root (U2R). Although, MLP with 15 selected input features, instead of 41 standard features introduced by knowledge discovery and data mining group (KDD), has better classification rates for other attack categories. This network performs better in terms of detection rate (DR), false alarm rate (FAR), and cost per example (CPE) when compared with some other machine learning methods, as well.</Abstract>
		<ObjectList>
            			<Object Type="keyword">
				<Param Name="value">Rule extraction</Param>
			</Object>
						<Object Type="keyword">
				<Param Name="value">Intrusion Detection System</Param>
			</Object>
						<Object Type="keyword">
				<Param Name="value">Quadrotor, nonlinear control, Lyapunov Stability, Genetic Algorithm, Gain Tuning. ,</Param>
			</Object>
						<Object Type="keyword">
				<Param Name="value">Neural Networks.</Param>
			</Object>
					</ObjectList>
	</Article>
	</ArticleSet>
