Title :
Application of Rough Set Theory to Intrusion Detection System
Author :
Wang, Xuren ; He, Famei ; Liu, Lizhen
Author_Institution :
Capital Normal Univ., Beijing
Abstract :
In intrusion detection systems, many intelligent information processing methods, soft computing technology and so on have been applied to generating attack signatures automatically, updating signatures easily and improving detection accuracy with ultra data sets. This paper presents a network intrusion detection system based on rough set theory. The system exploits data reductions, rule selection, feature selection of rough set theory to improve detection accuracy, preprocess data and reduce false alarm and unreal alarm. Empirical results illustrate that the intrusion detection model can detect intrusions accurately.
Keywords :
Internet; computer networks; rough set theory; telecommunication security; Internet services; automatic attack signature generation; data reductions; feature selection; intelligent information processing methods; network intrusion detection system; rough set theory; rule selection; soft computing technology; Artificial intelligence; Computer applications; Computer crime; Data mining; Educational institutions; Intelligent systems; Intrusion detection; Machine learning; Set theory; Web and internet services;
Conference_Titel :
Granular Computing, 2007. GRC 2007. IEEE International Conference on
Conference_Location :
Fremont, CA
Print_ISBN :
978-0-7695-3032-1
DOI :
10.1109/GrC.2007.132