Intrusion detection based on rough set and artificial immune

被引:0
|
作者
张玲 [1 ]
Sun Haiyan [1 ]
Cui Jiantao [1 ]
Yang Hua [1 ]
Huang Yan [1 ]
机构
[1] Software Engineering College,Zhengzhou University of Light Industry
基金
中国国家自然科学基金;
关键词
rough set; artificial immune; anomaly intrusion detection; rough set and artificial immune(RSAI-IDA);
D O I
暂无
中图分类号
TP18 [人工智能理论]; TP393.08 [];
学科分类号
081104 ; 0812 ; 0835 ; 0839 ; 1402 ; 1405 ;
摘要
In order to increase intrusion detection rate and decrease false positive detection rate,a novel intrusion detection algorithm based on rough set and artificial immune( RSAI-IDA) is proposed.Using artificial immune in intrusion detection,anomaly actions are detected adaptively,and with rough set,effective antibodies can be obtained. A scheme,in which antibodies are partly generated randomly and others are from the artificial immune algorithm,is applied to ensure the antibodies diversity. Finally,simulations of RSAI-IDA and comparisons with other algorithms are given. The experimental results illustrate that the novel algorithm achieves more effective performances on anomaly intrusion detection,where the algorithm’s time complexity decreases,the true positive detection rate increases,and the false positive detection rate is decreased.
引用
收藏
页码:368 / 375
页数:8
相关论文
共 50 条
  • [41] An adaptive detection framework based on artificial immune for IoT intrusion detection system
    Ma, Ming
    Yang, Geying
    He, Junjiang
    Fang, Wenbo
    APPLIED SOFT COMPUTING, 2024, 166
  • [42] An Approach to the Transformer Faults Diagnosing Based on Rough Set and Artificial Immune System
    Shaoming Song
    Yaonan Wang
    Shengxin Yao
    Min Wang
    PROCEEDINGS OF THE 2008 CHINESE CONFERENCE ON PATTERN RECOGNITION (CCPR 2008), 2008, : 450 - +
  • [43] A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection
    Ren, Min
    Wang, Zhihao
    Zhao, Peiying
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 278 - 299
  • [44] Rough Set Significant Reduction and Rules of Intrusion Detection System
    Sulaiman, Noor Suhana
    Abu Bakar, Rohani
    ADVANCES IN DIGITAL TECHNOLOGIES, 2016, 282 : 65 - 76
  • [45] Method on Rule Extracting in Misuse Intrusion Detection Based on Rough Set Genetic Algorithm
    Qin Aiming
    Shao Li
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 731 - 734
  • [46] A Network Intrusion Detection Algorithm Based on Rough Set Attribute-weighted Clustering
    Wang Lifang
    ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 3551 - 3554
  • [47] Feature Selection for Flow-based Intrusion Detection Using Rough Set Theory
    Beer, Frank
    Buehler, Ulrich
    PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 617 - 624
  • [48] Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems
    Raman, M. R. Gauthama
    Kannan, K.
    Pal, S. K.
    Sriram, V. S. Shankar
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 612 - 617
  • [49] A fast host-based intrusion detection system using rough set theory
    Rawat, S
    Gulati, VP
    Pujari, AK
    TRANSACTIONS ON ROUGH SETS IV, 2005, 3700 : 144 - 161
  • [50] THE APPLIED RESEARCH OF ROUGH SET ATTRIBUTES REDUCTION IN INTRUSION DETECTION
    Xie Jingwei
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 173 - 178