Intrusion detection using rough set classification

被引:23
|
作者
Zhang L.-H. [1 ,2 ]
Zhang G.-H. [1 ]
Yu L.
Zhang J. [3 ]
Bai Y.-C. [1 ]
机构
[1] Dept. of Comp. Sci. and Eng., Shanghai Jiaotong Univ.
[2] Anzong Info. Technol. Inc.
[3] Dept. of Comp., Hong Kong Polytech. Univ., Hong Kong
来源
关键词
Genetic algorithm; Intrusion detection; Rough set classification; Support vector machine;
D O I
10.1631/jzus.2004.1076
中图分类号
学科分类号
摘要
Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing much iteration, each of which removes one useless feature. Compared with those methods, our method can avoid much iteration. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of IF-THEN rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).
引用
收藏
页码:1076 / 1086
页数:10
相关论文
共 50 条
  • [1] Intrusion detection using rough set classification
    张连华
    张冠华
    郁郎
    张洁
    白英彩
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (09) : 70 - 80
  • [2] Network connection based intrusion detection using rough set classification
    Zhang, Hongmei
    Wang, Xingyu
    Wang, Yong
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2128 - +
  • [3] Dimensionality reduction for intrusion detection using rough set
    Yu Ling
    Chen Bo
    [J]. ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 1315 - 1320
  • [4] Feature selection using rough set in intrusion detection
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2026 - +
  • [5] Intrusion detection system using rough classification algorithm
    Coutinho, M.P.
    Coutinho, I.P.
    Lambert-Torres, G.
    Borges Da Silva, L.E.
    [J]. Advances in Systems Engineering, Signal Processing and Communications, 2002, : 329 - 334
  • [6] Performance Evaluation of Rough Set Based Classification Models to Intrusion Detection System
    Suyal, Priyanka
    Pant, Janmejay
    Dwivedi, Akhilesh
    Lohani, Manoj Chandra
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 209 - 214
  • [7] A classification model based on svm and fuzzy rough set for network intrusion detection
    Shen Kejia
    Parvin, Hamid
    Qasem, Sultan Noman
    Bui Anh Tuan
    Pho, Kim-Hung
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6801 - 6817
  • [8] Application of rough set theory to intrusion detection system
    Wang, Xuren
    He, Famei
    Liu, Lizhen
    [J]. GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
  • [9] Research on Intrusion Detection of Database based on Rough Set
    Zhang, Jihong
    Chen, Xiaoquan
    [J]. INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1637 - 1641
  • [10] Intrusion detection based on rough set and artificial immune
    张玲
    Sun Haiyan
    Cui Jiantao
    Yang Hua
    Huang Yan
    [J]. High Technology Letters, 2016, 22 (04) : 368 - 375