Intrusion detection using rough set classification

被引:0
|
作者
张连华
张冠华
郁郎
张洁
白英彩
机构
[1] Shanghai 200030
[2] Department of Computing
[3] Department of Computer Science and Engineering
[4] Shanghai Jiaotong University
[5] Shanghai 200042
[6] www. antpower. org
[7] Hong Kong Polytechnic University
[8] China
[9] China An Zong Information Technology Inc.
关键词
Intrusion detection; Rough set classification; Support vector machine; Genetic algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and compa
引用
收藏
页码:70 / 80
页数:11
相关论文
共 50 条
  • [1] Intrusion detection using rough set classification
    Zhang L.-H.
    Zhang G.-H.
    Yu L.
    Zhang J.
    Bai Y.-C.
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (9): : 1076 - 1086
  • [2] Network connection based intrusion detection using rough set classification
    Zhang, Hongmei
    Wang, Xingyu
    Wang, Yong
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2128 - +
  • [3] Feature selection using rough set in intrusion detection
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2026 - +
  • [4] Dimensionality reduction for intrusion detection using rough set
    Yu Ling
    Chen Bo
    [J]. ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 1315 - 1320
  • [5] Performance Evaluation of Rough Set Based Classification Models to Intrusion Detection System
    Suyal, Priyanka
    Pant, Janmejay
    Dwivedi, Akhilesh
    Lohani, Manoj Chandra
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 209 - 214
  • [6] A classification model based on svm and fuzzy rough set for network intrusion detection
    Shen Kejia
    Parvin, Hamid
    Qasem, Sultan Noman
    Bui Anh Tuan
    Pho, Kim-Hung
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6801 - 6817
  • [7] Application of rough set theory to intrusion detection system
    Wang, Xuren
    He, Famei
    Liu, Lizhen
    [J]. GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
  • [8] Intrusion detection based on rough set and artificial immune
    张玲
    Sun Haiyan
    Cui Jiantao
    Yang Hua
    Huang Yan
    [J]. High Technology Letters, 2016, 22 (04) : 368 - 375
  • [9] Using Rough Set and Support Vector Machine for Network Intrusion Detection System
    Chen, Rung-Ching
    Cheng, Kai-Fan
    Chen, Ying-Hao
    Hsieh, Chia-Fen
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 465 - 470
  • [10] Research on Intrusion Detection of Database based on Rough Set
    Zhang, Jihong
    Chen, Xiaoquan
    [J]. INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1637 - 1641