Two hybrid methods based on rough set theory for network intrusion detection

被引:0
|
作者
Dept. of Information Science and Technology, East China University of Political Science and Law, Shanghai, China [1 ]
机构
来源
J. Harbin Inst. Technol. | / 6卷 / 22-27期
关键词
C (programming language) - Network security - Data mining - Fuzzy systems - Rough set theory;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose two intrusion detection methods which combine rough set theory and Fuzzy C-Means for network intrusion detection. The first step consists of feature selection which is based on rough set theory. The next phase is clustering by using Fuzzy C-Means. Rough set theory is an efficient tool for further reducing redundancy. Fuzzy C-Means allows the objects to belong to several clusters simultaneously, with different degrees of membership. To evaluate the performance of the introduced approaches, we apply them to the international Knowledge Discovery and Data mining intrusion detection dataset. In the experimentations, we compare the performance of two rough set theory based hybrid methods for network intrusion detection. Experimental results illustrate that our algorithms are accurate models for handling complex attack patterns in large network. And these two methods can increase the efficiency and reduce the dataset by looking for overlapping categories. ©, 2014, Harbin Institute of Technology. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
    Na Jiao
    Journal of Harbin Institute of Technology(New series), 2014, (06) : 22 - 27
  • [2] Rough Set Theory based Hybrid Method for Network Intrusion Detection
    Jiao, Na
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 815 - 818
  • [3] RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection
    Jiang, Jianguo
    Wang, Qiwen
    Shi, Zhixin
    Lv, Bin
    Qi, Biao
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 77 - 81
  • [4] A rough set theory based method for anomaly intrusion detection in computer network systems
    Cai, ZM
    Guan, XH
    Shao, P
    Peng, QK
    Sun, GJ
    EXPERT SYSTEMS, 2003, 20 (05) : 251 - 259
  • [5] AN INTRUSION DETECTION SYSTEM BASED ON EVIDENCE THEORY AND ROUGH SET THEORY
    Ye Qing Wu Xiaoping Zhang Changhong (College of Electronic Engineering
    JournalofElectronics(China), 2009, 26 (06) : 777 - 781
  • [6] ANOMALY INTRUSION DETECTION METHOD BASED ON ROUGH SET THEORY
    Li, Yong-Zhong
    Zhao, Bo
    Xu, Jing
    Yang, Ge
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, : 764 - 770
  • [7] A new framework for intrusion detection based on rough set theory
    Li, ZJ
    Wu, Y
    Wang, GY
    Hai, YJ
    He, YP
    DATA MINING AND KNOWLEDGE DISCOVERY: THEORY, TOOLS, AND TECHNOLOGY VI, 2004, 5433 : 122 - 130
  • [8] Joint Rough Set Theory and XGBoost-Based Learning for Network Intrusion Detection System
    Alsabilah, Nasser
    Rawat, Danda B.
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 7930 - 7937
  • [9] Network connection based intrusion detection using rough set classification
    Zhang, Hongmei
    Wang, Xingyu
    Wang, Yong
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2128 - +
  • [10] Research of Distributed Network Intrusion Detection System Based on Rough Set
    Zhong Zufeng
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 200 - 202