Intrusion Detection Technique Based on the Grey Theory

Article Preview

Abstract:

The detection technique is designed and equipped to ensure the security of the computer system, and to find and report the unauthorized and the abnormal phenomena of the system on time. It is a technique used to detect the behavior that goes against the security principle of the computer system. The author applies the grey theory to build a instrusion detection data based on GM(1,1)model to compensate the data preprocessing model, and an index reducing algorithm which is based on grey relation. They have some characteristics, such as a few samples, low complexity, easy procedural realization, and can solve the renewed samples quickly. We have had a demonstration analysis, which shows that these models can help to reduce the occupied system resources obviously, enhance the timeliness and accuracy, and reduce rate of undetected errors and false retrieval.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 562-564)

Pages:

2134-2138

Citation:

Online since:

August 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Changxin, Zhang Yuntian. Grey Correlation Method based on the grey GM1, 1 data mining model [ J ]. Changsha aeronautical vocational and technical College journals, 2005, 53: 60.

Google Scholar

[2] Xiong Hejin, Xu Huazhong. Grey control [ M ]. Beijing : National Defence Industry press, (2005).

Google Scholar

[3] Cao Kui, Tan Shuimu, Feng yu-cai. Content-based Image Retrieval Technique Using Grey Clustering Method [ J ]. Computer engineering, 2006, 321: 195.

Google Scholar

[4] Zhang Xuebin, Ding Xiaoming . An Algorithm for Attribute Value Reduction Based on Association Rules Mining [ J ]. Journal of Southwest University (Natural Sciences Edition), 2005, 303: 440.

Google Scholar

[5] Chen Xiaomei. Study on the Data Preprocessing in Intrusion Detection [ J ]. Computer Science, 2006, 331: 81.

Google Scholar