Host-Based Intrusion Detection Architecture Based on Rough Set Theory and Machine Learning

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research of Network Intrusion Detection System based on Machine Learning and Rough Set Theory

Data mining for intrusion detection is one of the most cutting-edge researches which focus on network security, database, and information decision-making. Due to the emergence of new forms of attacks and intrusion on the network, we need a new intrusion detection system which would be able to detect new and unknown attacks. In the paper, by studying the characteristics of network data intrusion...

متن کامل

Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine

Intrusion detection system is used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. Subsequently, these behaviors are checked as an attack or normal behavior. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. Most of the earlier IDs make use of all the features in the packet to analyze and loo...

متن کامل

A Fast Host-Based Intrusion Detection System Using Rough Set Theory

Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that m...

متن کامل

A Intrusion Detection Method Based on Neighborhood Rough Set

A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Engineering and Applied Sciences

سال: 2019

ISSN: 1816-949X

DOI: 10.36478/jeasci.2019.415.422