The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection

نویسندگان

  • Zhicai Shi
  • Yongxiang Xia
  • Fei Wu
  • Jian Dai
چکیده

The data processed by intrusion detection systems usually is vague, uncertainty, imprecise and incomplete. Rough Set theory is one of the best methods to process this kind of data. But Rough Set theory can only process some discrete data. So the data with continuous numerical attributes must be discretized before they are used. Some current discretization algorithms are classified and reviewed in detail. The mathematical descriptions of the discretization problem and intrusion detection are given by means of Rough Set theory. By fusing Rough Set theory with entropy theory we propose a simple and fast discretization algorithm based on information loss. The algorithm is applied to different samples with the same attributes from KDDcup99 and intrusion detection systems. The discretized data is used to reduce attributes so as to relieve the payload of intrusion detection systems. The experimental results show that the proposed discretization algorithm is sensitive to the initial samples only for part of all condition attributes. But the algorithm dose not compromise the effect of intrusion detection and it improves the response performance of the intrusion detection model remarkably.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on the Data Pre-Processing in the Network Abnormal Intrusion Detection

The data pre-processing is a very important step in network abnormal intrusion detection, and directly affects the accuracy of the subsequent detection. In this paper, there are two issues in the network abnormal intrusion detection based on the hierarchical clustering so that some improvements should be made in the data pre-processing stage: first, there is the redundancy and attribute weight ...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

A Novel Methodology for Database Knowledge Discovery

This paper presents the rough set and genetic algorithms application to knowledge discovery in databases (RSGAKD). The purpose of the methodology is to use specified data for knowledge extraction from computer security logs. The methodology is outlined in terms of its objectives, scope, constraints, assumptions, and tools. The framework introduces rough set based knowledge approach. Where appro...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014