Research on Intrusion Detection of Database based on Rough Set

被引:2
|
作者
Zhang, Jihong [1 ]
Chen, Xiaoquan [1 ]
机构
[1] Minist Transport Peoples Republ China, Transport Management Inst, Dept Comp Sci, Beijing, Peoples R China
关键词
rough set; intrusion detection; rule base; event generator;
D O I
10.1016/j.phpro.2012.03.287
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this article, we apply the rough set theory to database intrusion detection and monitor the data in real time with intrusion detection. While theory based on rough set will judge the attacks according to the rules and respond to the sample data of intrusion detection after preprocessing them. (C) 2012 Published by Elsevier B.V. Selection and/or peer-review under responsibility of Garry Lee
引用
收藏
页码:1637 / 1641
页数:5
相关论文
共 50 条
  • [21] Performance Evaluation of Rough Set Based Classification Models to Intrusion Detection System
    Suyal, Priyanka
    Pant, Janmejay
    Dwivedi, Akhilesh
    Lohani, Manoj Chandra
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 209 - 214
  • [22] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [23] An Intrusion Detection Algorithm based on D-S Theory and Rough Set
    Wang, Lifang
    Zhang, Shuhai
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (19-23) : 19 - 23
  • [24] Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
    Na Jiao
    [J]. Journal of Harbin Institute of Technology(New series), 2014, (06) : 22 - 27
  • [25] SVM Ensemble Intrusion Detection Model Based on Rough Set Feature Reduct
    Zhang Hongmei
    [J]. CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5604 - 5608
  • [26] Two hybrid methods based on rough set theory for network intrusion detection
    Dept. of Information Science and Technology, East China University of Political Science and Law, Shanghai, China
    [J]. J. Harbin Inst. Technol., 6 (22-27):
  • [27] A classification model based on svm and fuzzy rough set for network intrusion detection
    Shen Kejia
    Parvin, Hamid
    Qasem, Sultan Noman
    Bui Anh Tuan
    Pho, Kim-Hung
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6801 - 6817
  • [28] An efficient feature selection based Bayesian and Rough set approach for intrusion detection
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    [J]. APPLIED SOFT COMPUTING, 2020, 87 (87)
  • [29] A Rough Set Based Decision Tree Algorithm and Its Application in Intrusion Detection
    Zhou, Lin
    Jiang, Feng
    [J]. PATTERN RECOGNITION AND MACHINE INTELLIGENCE, 2011, 6744 : 333 - 338
  • [30] Rough set theory's application on intrusion detection based on system calls
    Wang, LJ
    Gao, C
    [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 83 - 86