A Network Intrusion Detection Algorithm Based on Rough Set Attribute-weighted Clustering

被引:0
|
作者
Wang Lifang [1 ]
机构
[1] N Univ China, Inst Elect & Comp Sci Technol, Taiyuang 030051, Shanxi, Peoples R China
关键词
Rough Set; Weighted Clustering; Intrusion Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection system is automatic system which recognize intrusions to computers or computer network systems. Existing security detection system has many problems such as wrong detection of intrusions, missed intrusions, poor real-time performance. An intrusion detection algorithm is developed by combining a rough set algorithm with intrusion detection technology for security detection, attribute reduction, production of detection rules, and finally analysis of intrusion data with these rules. Based on it, a new rough set attribute-weighted clustering algorithm is used in network intrusion detection. Test rules show that the intrusion detection algorithm is more efficient than algorithm based on BP (back propagation) neural networks and vector machines, thereby, improving the detection ratio and reduces the wrong detection ratio. The system provides detection service effective for information system.
引用
收藏
页码:3551 / 3554
页数:4
相关论文
共 50 条
  • [31] A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection
    Wang, Lina
    Wang, Jie
    Ren, Yongjun
    Xing, Zimeng
    Li, Tao
    Xia, Jinyue
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 31 - 47
  • [32] Rough Set Methods for Attribute Clustering and Selection
    Janusz, Andrzej
    Slezak, Dominik
    APPLIED ARTIFICIAL INTELLIGENCE, 2014, 28 (03) : 220 - 242
  • [33] A rough set approach for selecting clustering attribute
    Herawan, Tutut
    Deris, Mustafa Mat
    Abawajy, Jemal H.
    KNOWLEDGE-BASED SYSTEMS, 2010, 23 (03) : 220 - 231
  • [34] Intrusion detection based on rough set and artificial immune
    张玲
    Sun Haiyan
    Cui Jiantao
    Yang Hua
    Huang Yan
    High Technology Letters, 2016, 22 (04) : 368 - 375
  • [35] A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection
    Ren, Min
    Wang, Zhihao
    Zhao, Peiying
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 278 - 299
  • [36] Research on Intrusion Detection of Database based on Rough Set
    Zhang, Jihong
    Chen, Xiaoquan
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1637 - 1641
  • [37] Method on Rule Extracting in Misuse Intrusion Detection Based on Rough Set Genetic Algorithm
    Qin Aiming
    Shao Li
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 731 - 734
  • [38] Rough Set Attribute Reduction Algorithm Based on Immune Genetic Algorithm
    Zhi Jun
    Liu Jian-yong
    Wang Zhen
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 421 - 424
  • [39] Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm
    Duan, Xindong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [40] Fuzzy Rough Clustering Analysis Algorithm Based on Attribute Reduction
    Ouyang, Hao
    Wang, Zhi Wen
    Huang, Zhen Jin
    Hu, Wei Ping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SENSING AND IMAGING, 2018, 2019, 606 : 1 - 13