A Network Intrusion Detection Algorithm Based on Rough Set Attribute-weighted Clustering

被引:0
|
作者
Wang Lifang [1 ]
机构
[1] N Univ China, Inst Elect & Comp Sci Technol, Taiyuang 030051, Shanxi, Peoples R China
关键词
Rough Set; Weighted Clustering; Intrusion Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection system is automatic system which recognize intrusions to computers or computer network systems. Existing security detection system has many problems such as wrong detection of intrusions, missed intrusions, poor real-time performance. An intrusion detection algorithm is developed by combining a rough set algorithm with intrusion detection technology for security detection, attribute reduction, production of detection rules, and finally analysis of intrusion data with these rules. Based on it, a new rough set attribute-weighted clustering algorithm is used in network intrusion detection. Test rules show that the intrusion detection algorithm is more efficient than algorithm based on BP (back propagation) neural networks and vector machines, thereby, improving the detection ratio and reduces the wrong detection ratio. The system provides detection service effective for information system.
引用
收藏
页码:3551 / 3554
页数:4
相关论文
共 50 条
  • [21] An Intrusion Detection Algorithm based on D-S Theory and Rough Set
    Wang, Lifang
    Zhang, Shuhai
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (19-23) : 19 - 23
  • [22] A Rough Set Based Decision Tree Algorithm and Its Application in Intrusion Detection
    Zhou, Lin
    Jiang, Feng
    PATTERN RECOGNITION AND MACHINE INTELLIGENCE, 2011, 6744 : 333 - 338
  • [23] A clustering algorithm based on rough set and genetic algorithm
    Xiong, Y. (ysxiongyeah@163.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [24] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [25] Two hybrid methods based on rough set theory for network intrusion detection
    Dept. of Information Science and Technology, East China University of Political Science and Law, Shanghai, China
    J. Harbin Inst. Technol., 6 (22-27):
  • [26] A classification model based on svm and fuzzy rough set for network intrusion detection
    Shen Kejia
    Parvin, Hamid
    Qasem, Sultan Noman
    Bui Anh Tuan
    Pho, Kim-Hung
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6801 - 6817
  • [27] Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
    Na Jiao
    Journal of Harbin Institute of Technology(New series), 2014, (06) : 22 - 27
  • [28] An improved attribute reduction algorithm based on rough set
    Wang, Haijun
    Wei, Shaoliang
    Chen, Yimin
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 1007 - +
  • [29] An Attribute-Weighted Bayes Classifier Based on Asymmetric Correlation Coefficient
    Liu, Jingxian
    Zhang, Yulin
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 34 (10)
  • [30] ROUGH SET THEORY FOR SELECTING CLUSTERING ATTRIBUTE
    Herawan, Tutut
    Dens, Mustafa Mat
    POWER CONTROL AND OPTIMIZATION, PROCEEDINGS, 2009, 1159 : 331 - 338