A New Intrusion Detection Method Based on Rough Sets for Network Security

Article Preview

Abstract:

In this paper, we introduce a new intrusion detection method based on rough sets for network. The first step consists of feature selection which is based on rough set theory. The next phase is clustering by using Fuzzy C-Means. Rough set theory is an efficient tool for further reducing redundancy. Fuzzy C-Means allows objects which are belong to several clusters simultaneously, with different degrees of membership. To evaluate the performance of the introduced approaches, we applied them to the international Knowledge Discovery and Data mining intrusion detection dataset. Experimental results illustrate that our algorithm is accurate models for handling complex attack patterns in large network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 915-916)

Pages:

1311-1314

Citation:

Online since:

April 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Amini and R. Jalili. Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004). Madeira, Portugal.

Google Scholar

[2] A. O. ADETUNMBI, Z. W. Shi, et al. Proceedings of International Federation for Information Processing (IFIP). Boston: Springer, Vol. 228(2006) p.525.

Google Scholar

[3] A. Ajith, G. Crina, Y. H. Chen. Journal of Educational Technology, Special Issue in Knowledge Management, Vol. 1(2005) p.74.

Google Scholar

[4] X. Wang and F. HE. IEEE International Conference on Hybrid Information Technology (ICHIT'06). Washington DC, USA: IEEE Press, (2006) p.114.

Google Scholar

[5] A. O. ADETUNMBI, et al. International Journal of Computing and ICT Research, Vol. 2(2008) p.60.

Google Scholar

[6] Z. Pawlak: International Journal of Computer and Information Sciences, Vol. 11(1982), p.341.

Google Scholar

[7] Leifang Hui, Jiandong Li and Dan Chen: Journal of Beijing University of Posts and Telecommunications, 2011, Vol. 34(2011), p.30.

Google Scholar

[8] Y.Y. Yao and Y. Information Sciences, Vol. 179(2009) p.867.

Google Scholar