Please submit manuscripts in either of the following two submission systems

    ScholarOne Manuscripts

  • ScholarOne
  • 勤云稿件系统

  • 登录

Search by Issue

  • 2024 Vol.31
  • 2023 Vol.30
  • 2022 Vol.29
  • 2021 Vol.28
  • 2020 Vol.27
  • 2019 Vol.26
  • 2018 Vol.25
  • 2017 Vol.24
  • 2016 vol.23
  • 2015 vol.22
  • 2014 vol.21
  • 2013 vol.20
  • 2012 vol.19
  • 2011 vol.18
  • 2010 vol.17
  • 2009 vol.16
  • No.1
  • No.2

Supervised by Ministry of Industry and Information Technology of The People's Republic of China Sponsored by Harbin Institute of Technology Editor-in-chief Yu Zhou ISSNISSN 1005-9113 CNCN 23-1378/T

期刊网站二维码
微信公众号二维码
Related citation:Na Jiao.Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection[J].Journal of Harbin Institute Of Technology(New Series),2014,21(6):22-27.DOI:10.11916/j.issn.1005-9113.2014.06.005.
【Print】   【HTML】   【PDF download】   View/Add Comment  Download reader   Close
←Previous|Next→ Back Issue    Advanced Search
This paper has been: browsed 1082times   downloaded 866times 本文二维码信息
码上扫一扫!
Shared by: Wechat More
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
Author NameAffiliation
Na Jiao Dept. of Information Science and Technology, East China University of Political Science and Law, Shanghai 201620, China 
Abstract:
In this paper, we propose two intrusion detection methods which combine rough set theory and Fuzzy C-Means for network intrusion detection. The first step consists of feature selection which is based on rough set theory. The next phase is clustering by using Fuzzy C-Means. Rough set theory is an efficient tool for further reducing redundancy. Fuzzy C-Means allows the objects to belong to several clusters simultaneously, with different degrees of membership. To evaluate the performance of the introduced approaches, we apply them to the international Knowledge Discovery and Data mining intrusion detection dataset. In the experimentations, we compare the performance of two rough set theory based hybrid methods for network intrusion detection. Experimental results illustrate that our algorithms are accurate models for handling complex attack patterns in large network. And these two methods can increase the efficiency and reduce the dataset by looking for overlapping categories.
Key words:  rough set theory  Fuzzy C-Means  network security  intrusion detection
DOI:10.11916/j.issn.1005-9113.2014.06.005
Clc Number:TP393.08
Fund:

LINKS