Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm
نویسندگان
چکیده
Since there is a close relationship between network information security attack events and time complexity, it necessary to count the degree of correlation current connection record within certain period before. Only in this way can data be better reflected. In paper, rough Fourier fast algorithm based on set theory proposed. Based characteristic attributes intrusion detection with most value character as division basis, computer anomaly intelligently divided into small sets, so carry out attribute reduction. The rule update experiment adopts misuse method, extracts some samples from KDD99 for training, obtains rules hierarchical decision table, uses incremental learning rules, compared expressed by table test feasibility effectiveness update, improved RSDB, RE-RFE algorithm, KNN evaluate effect model applied problem detection. Using subset reduced perform classification modeling significantly reduced, average 0.09 seconds, paper lays good foundation application algorithm.
منابع مشابه
A rough set theory based method for anomaly intrusion detection in computer network systems
Intrusion detection is important in the defensein-depth network security framework. This paper presents an effective method for anomaly intrusion detection with low overhead and high efficiency. The method is based on rough set theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a pro...
متن کاملAnomaly Based Intrusion Detection Based on the Junction Tree Algorithm
The aim of this paper is to present a methodology for the attacks recognition during the normal activities in the system. Since the proposed approach uses the graphical representation method, we apply the junction tree algorithm (JTA). Some results from the accomplished simulation experiments are submitted as well.
متن کاملRevisiting Anomaly-based Network Intrusion Detection Systems
Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match with current input raises an alert. A signature-based IDS cannot detect unknown attacks, either ...
متن کاملNetwork Intrusion Detection based on GMKL Algorithm
According to the 31th statistical reports of China Internet network information center (CNNIC), by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing t...
متن کاملA Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection
In this paper, we propose an intrusion detection method that combines rough sets theory and fuzzy c-means for anomaly detection. The first step consists of attribute selection which is based on rough set theory for each of the 5 classes of intrusions in the Defense Advanced Research Projects Agency (DARPA) data is identified. The next phase is clustering by using fuzzy c-means; we are using rou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2022
ISSN: ['1026-7077', '1563-5147', '1024-123X']
DOI: https://doi.org/10.1155/2022/4751844