Research on Intrusion Detection of Database based on Rough Set

被引:2
|
作者
Zhang, Jihong [1 ]
Chen, Xiaoquan [1 ]
机构
[1] Minist Transport Peoples Republ China, Transport Management Inst, Dept Comp Sci, Beijing, Peoples R China
关键词
rough set; intrusion detection; rule base; event generator;
D O I
10.1016/j.phpro.2012.03.287
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this article, we apply the rough set theory to database intrusion detection and monitor the data in real time with intrusion detection. While theory based on rough set will judge the attacks according to the rules and respond to the sample data of intrusion detection after preprocessing them. (C) 2012 Published by Elsevier B.V. Selection and/or peer-review under responsibility of Garry Lee
引用
收藏
页码:1637 / 1641
页数:5
相关论文
共 50 条
  • [1] Research on Intrusion Detection Based on Genetic Algorithm and Rough Set
    Li, Shiyong
    Zhu, Yanli
    Ma, Lijuan
    Liang, Yunjuan
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 175 - 177
  • [2] Research of intrusion detection method based on rough set and adaptive boost
    Song Jian
    Zou Muchun
    Sun Wei
    Zou Muchun
    [J]. ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 142 - 145
  • [3] Research of Distributed Network Intrusion Detection System Based on Rough Set
    Zhong Zufeng
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 200 - 202
  • [4] THE APPLIED RESEARCH OF ROUGH SET ATTRIBUTES REDUCTION IN INTRUSION DETECTION
    Xie Jingwei
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 173 - 178
  • [5] Intrusion detection based on rough set and artificial immune
    张玲
    Sun Haiyan
    Cui Jiantao
    Yang Hua
    Huang Yan
    [J]. High Technology Letters, 2016, 22 (04) : 368 - 375
  • [6] An intrusion detection method based on rough set and SVM algorithm
    Hong, P
    Zhang, DN
    Wu, TF
    [J]. 2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2004, : 1127 - 1130
  • [7] Intrusion Detection Model Based on Rough Set and Random Forest
    Ling, Zhang
    Wei, Zhang Jian
    Mei, Fan Nai
    Hao, Zhao Hao
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2022, 14 (01)
  • [8] A new framework for intrusion detection based on rough set theory
    Li, ZJ
    Wu, Y
    Wang, GY
    Hai, YJ
    He, YP
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY: THEORY, TOOLS, AND TECHNOLOGY VI, 2004, 5433 : 122 - 130
  • [9] ANOMALY INTRUSION DETECTION METHOD BASED ON ROUGH SET THEORY
    Li, Yong-Zhong
    Zhao, Bo
    Xu, Jing
    Yang, Ge
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, : 764 - 770
  • [10] Intrusion detection using rough set classification
    Zhang L.-H.
    Zhang G.-H.
    Yu L.
    Zhang J.
    Bai Y.-C.
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (9): : 1076 - 1086