Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm

نویسندگان

چکیده

Since there is a close relationship between network information security attack events and time complexity, it necessary to count the degree of correlation current connection record within certain period before. Only in this way can data be better reflected. In paper, rough Fourier fast algorithm based on set theory proposed. Based characteristic attributes intrusion detection with most value character as division basis, computer anomaly intelligently divided into small sets, so carry out attribute reduction. The rule update experiment adopts misuse method, extracts some samples from KDD99 for training, obtains rules hierarchical decision table, uses incremental learning rules, compared expressed by table test feasibility effectiveness update, improved RSDB, RE-RFE algorithm, KNN evaluate effect model applied problem detection. Using subset reduced perform classification modeling significantly reduced, average 0.09 seconds, paper lays good foundation application algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A rough set theory based method for anomaly intrusion detection in computer network systems

Intrusion detection is important in the defensein-depth network security framework. This paper presents an effective method for anomaly intrusion detection with low overhead and high efficiency. The method is based on rough set theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a pro...

متن کامل

Anomaly Based Intrusion Detection Based on the Junction Tree Algorithm

The aim of this paper is to present a methodology for the attacks recognition during the normal activities in the system. Since the proposed approach uses the graphical representation method, we apply the junction tree algorithm (JTA). Some results from the accomplished simulation experiments are submitted as well.

متن کامل

Revisiting Anomaly-based Network Intrusion Detection Systems

Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match with current input raises an alert. A signature-based IDS cannot detect unknown attacks, either ...

متن کامل

Network Intrusion Detection based on GMKL Algorithm

According to the 31th statistical reports of China Internet network information center (CNNIC), by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing t...

متن کامل

A Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection

In this paper, we propose an intrusion detection method that combines rough sets theory and fuzzy c-means for anomaly detection. The first step consists of attribute selection which is based on rough set theory for each of the 5 classes of intrusions in the Defense Advanced Research Projects Agency (DARPA) data is identified. The next phase is clustering by using fuzzy c-means; we are using rou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematical Problems in Engineering

سال: 2022

ISSN: ['1026-7077', '1563-5147', '1024-123X']

DOI: https://doi.org/10.1155/2022/4751844