Fuzzy integrated rough set theory situation feature extraction of network security

被引:15
作者
Zhao, Dongmei [1 ,2 ,3 ]
Song, Huiqian [1 ,2 ]
Li, Hong [1 ,2 ]
机构
[1] Hebei Normal Univ, Coll Comp & Cyber Secur, Nanerhuan Rd, Shijiazhuang, Hebei, Peoples R China
[2] Hebei Key Lab Network & Informat Secur, Shijiazhuang, Hebei, Peoples R China
[3] Hebei Prov Engn Res Ctr Supply Chain Big Data Ana, Shijiazhuang, Hebei, Peoples R China
关键词
Situation factor extraction; neighborhood rough set; attribute reduction; parallel reduction; fuzzy rough set;
D O I
10.3233/JIFS-189664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The element extraction from network security condition is the foundation security awareness. Its excellence directly disturbsentire security system performance. In this paper we introduce fuzzy logic based rough set theory for extracting security conditional factors. The traditional extraction method of network security situation elements relies on a lot of prior knowledge. With the purpose of solving this issue, in this paper we proposed fuzzy rough set theory based feature rank matrix of neighborhood rough set. Additionally, we propose reduction based parallel algorithm that uses the concept of conditional entropy in order to constructs the feature rank matrix as well as, constructs the core attribute by using reduction rules, takes the threshold of standard deviation as the threshold, and redefines the multi threshold neighborhood of mixed data. The attack type recognition training is carried out on lib SVM, filtered classifier, j48 and random tree classifiers respectively. The results demonstrate that the proposed reduction based parallel algorithm can increase the accuracy of classification, shorten the modeling time, and show increased recall rate and decreased false alarm rate.
引用
收藏
页码:8439 / 8450
页数:12
相关论文
共 16 条
[1]   New types of soft rough sets in groups based on normal soft groups [J].
Ayub, Saba ;
Shabir, Muhammad ;
Mahmood, Waqas .
COMPUTATIONAL & APPLIED MATHEMATICS, 2020, 39 (02)
[2]  
Chaoxiong W., 2015, COMPUTER SCI, V42
[3]  
GUANG K, 2019, J ELECTRON INF TECHN, V41, P2187, DOI DOI 10.11999/JEIT181014
[4]  
Hongcheng F, 2014, COMPUT DIG ENG, V42, P436
[5]  
[胡清华 HU Qing-Hua], 2008, [模式识别与人工智能, Pattern Recognition and Artificial Intelligence], V21, P732
[6]  
Jiang W, 2019, J COMPUTER APPL, V39, P100
[7]  
Jiang Z, 2017, INT J DISTRIB SENS N, V13, P339
[8]   Multimedia big data computing and Internet of Things applications: A taxonomy and process model [J].
Kumari, Aparna ;
Tanwar, Sudeep ;
Tyagi, Sudhanshu ;
Kumar, Neeraj ;
Maasberg, Michele ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 124 :169-195
[9]  
[赖积保 Lai Jibao], 2010, [计算机科学, Computer Science], V37, P64
[10]   A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision Making [J].
Le Hoang Son ;
Roan Thi Ngan ;
Ali, Mumtaz ;
Fujita, Hamido ;
Abdel-Basset, Mohamed ;
Nguyen Long Giang ;
Manogaran, Gunasekaran ;
Priyan, M. K. .
IEEE INTELLIGENT SYSTEMS, 2020, 35 (01) :6-16