Rough Set Theory Based Hybrid Method for Network Intrusion Detection

Article Preview

Abstract:

In this paper, we propose an intrusion detection method that combines rough set theory and Fuzzy C-Means for network intrusion detection. The first step consists of feature selection which is based on rough set theory. The next phase is clustering by using Fuzzy C-Means. Rough set theory is an efficient tool for further reducing redundancy. Fuzzy C-Means allows objects which are belong to several clusters simultaneously, with different degrees of membership. To evaluate the performance of the introduced approach, we applied them to the international Knowledge Discovery and Data mining intrusion detection dataset. In the experimentations, we compare the performance of the rough set theory based hybrid method for network intrusion detection. Experimental results illustrate that our algorithm is accurate model for handling complex attack patterns in large network. And the method can increase the efficiency and reduce the dataset by looking for overlapping categories.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

815-818

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A.O. Adetunmbi and Zhiwei Shi: Proceedings of International Federation for Information Processing (IFIP). Boston: Springer, Vol. 228 (2006), p.525.

Google Scholar

[2] M. Amini and R. Jalili: Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004). Madeira, Portugal.

Google Scholar

[3] J. Twycross presented at the AISB 2004 Symposium on Immune System and Cognition. Leeds, U.K., (2004).

Google Scholar

[4] X. Wang and F. He: IEEE International Conference on Hybrid Information Technology (ICHIT'06). Washington DC, USA: IEEE Press, (2006), p.114.

Google Scholar

[5] Z. Pawlak: International Journal of Computer and Information Sciences, Vol. 11(1982), p.341.

Google Scholar

[6] Leifang Hui, Jiandong Li and Dan Chen: Journal of Beijing University of Posts and Telecommunications, 2011, Vol. 34(2011), p.30.

Google Scholar

[7] Y.Y. Yao and Y. Information Sciences, Vol. 179(2009) p.867.

Google Scholar

[8] Na Jiao, Duoqian Miao and Jie Zhou: Expert System with Applications, Vol. 37(2010), p.7419.

Google Scholar

[9] Na Jiao: Transactions on Rough Sets XIV, Lecture Notes in Computer Science, 6600(2011), p.100.

Google Scholar