Two hybrid methods based on rough set theory for network intrusion detection

被引:0
|
作者
Dept. of Information Science and Technology, East China University of Political Science and Law, Shanghai, China [1 ]
机构
来源
J. Harbin Inst. Technol. | / 6卷 / 22-27期
关键词
C (programming language) - Network security - Data mining - Fuzzy systems - Rough set theory;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose two intrusion detection methods which combine rough set theory and Fuzzy C-Means for network intrusion detection. The first step consists of feature selection which is based on rough set theory. The next phase is clustering by using Fuzzy C-Means. Rough set theory is an efficient tool for further reducing redundancy. Fuzzy C-Means allows the objects to belong to several clusters simultaneously, with different degrees of membership. To evaluate the performance of the introduced approaches, we apply them to the international Knowledge Discovery and Data mining intrusion detection dataset. In the experimentations, we compare the performance of two rough set theory based hybrid methods for network intrusion detection. Experimental results illustrate that our algorithms are accurate models for handling complex attack patterns in large network. And these two methods can increase the efficiency and reduce the dataset by looking for overlapping categories. ©, 2014, Harbin Institute of Technology. All right reserved.
引用
收藏
相关论文
共 50 条
  • [21] A fast host-based intrusion detection system using rough set theory
    Rawat, S
    Gulati, VP
    Pujari, AK
    TRANSACTIONS ON ROUGH SETS IV, 2005, 3700 : 144 - 161
  • [22] Simulation analysis of intrusion detection system based on genetic attribute reduction algorithm and neural network based on rough set theory
    Xu, Xin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (03) : 2937 - 2942
  • [23] A Network Intrusion Detection Algorithm Based on Rough Set Attribute-weighted Clustering
    Wang Lifang
    ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 3551 - 3554
  • [24] An intrusion detection method based on rough set and SVM algorithm
    Hong, P
    Zhang, DN
    Wu, TF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2004, : 1127 - 1130
  • [25] Research on Intrusion Detection Based on Genetic Algorithm and Rough Set
    Li, Shiyong
    Zhu, Yanli
    Ma, Lijuan
    Liang, Yunjuan
    2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 175 - 177
  • [26] Intrusion Detection System Based on Genetic Attribute Reduction Algorithm Based on Rough Set and Neural Network
    Luo, Jan
    Wang, Huajun
    Li, Yanmei
    Lin, Yuxi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [27] An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems
    Priyanga, S.
    Raman, M. R. Gauthama
    Jagtap, Sujeet S.
    Aswin, N.
    Kirthivasan, Kannan
    Sriram, V. S. Shankar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 3993 - 4003
  • [28] Intrusion Detection Model Based on Rough Set and Random Forest
    Ling, Zhang
    Wei, Zhang Jian
    Mei, Fan Nai
    Hao, Zhao Hao
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2022, 14 (01)
  • [29] Detection of Assaults in Network Intrusion System using Rough Set and Convolutional Neural Network
    Ahmed, N. Syed Siraj
    Khan, A. B. Feroz
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 139 (01) : 107 - 144
  • [30] Using Rough Set and Support Vector Machine for Network Intrusion Detection System
    Chen, Rung-Ching
    Cheng, Kai-Fan
    Chen, Ying-Hao
    Hsieh, Chia-Fen
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 465 - 470