• DocumentCode
    2989149
  • Title

    Anoamaly intrusion detection method based on Rough Set Theory

  • Author

    Li, Yong-zhong ; Zhao, Bo ; Xu, Jing ; Yang, Ge

  • Author_Institution
    Sch. of Electrics & Inf., Jiangsu Univ. of Sci. & Technol., Zhenjiang
  • Volume
    2
  • fYear
    2008
  • fDate
    30-31 Aug. 2008
  • Firstpage
    764
  • Lastpage
    770
  • Abstract
    Rough Set Theory has been widely used in pattern recognition. In this paper, the rough set theory has been applied to the intrusion detection. An effective method based rough set for anomaly intrusion detection with low overhead and high efficiency has been presented. The method is based on Rough Set Theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a process. It is capable of detecting the abnormal operating status of a process and thus reporting a possible intrusion. This method requires a smaller size of training data set compared with other methods, less effort to collect training data and is more suitable for real-time detection. Experimental results show that this method is promising in terms of detection accuracy and efficiency.
  • Keywords
    rough set theory; security of data; anomaly intrusion detection method; pattern recognition; rough set theory; system call sequences; Databases; Hidden Markov models; Information analysis; Intrusion detection; Machine learning; Pattern analysis; Pattern recognition; Set theory; Training data; Wavelet analysis; Anomaly detection; Intrusion detection; Rough sets;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wavelet Analysis and Pattern Recognition, 2008. ICWAPR '08. International Conference on
  • Conference_Location
    Hong Kong
  • Print_ISBN
    978-1-4244-2238-8
  • Electronic_ISBN
    978-1-4244-2239-5
  • Type

    conf

  • DOI
    10.1109/ICWAPR.2008.4635880
  • Filename
    4635880