CFP last date
20 May 2024
Reseach Article

Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine

by Shailendra Kumar Shrivastava, Preeti Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 3
Year of Publication: 2011
Authors: Shailendra Kumar Shrivastava, Preeti Jain
10.5120/2261-2906

Shailendra Kumar Shrivastava, Preeti Jain . Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine. International Journal of Computer Applications. 18, 3 ( March 2011), 35-41. DOI=10.5120/2261-2906

@article{ 10.5120/2261-2906,
author = { Shailendra Kumar Shrivastava, Preeti Jain },
title = { Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 3 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number3/2261-2906/ },
doi = { 10.5120/2261-2906 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:23.215868+05:30
%A Shailendra Kumar Shrivastava
%A Preeti Jain
%T Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 3
%P 35-41
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection system is used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. Subsequently, these behaviors are checked as an attack or normal behavior. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. Most of the earlier IDs make use of all the features in the packet to analyze and look for well-known intrusive models. Some of these features are unrelated and superfluous. The disadvantage of these methods is degrading the performance of IDs. The proposed Rough Set Support Vector Machine (RSSVM) approach is extensively decreases the computer resources like memory and CPU utilization which are required to identify an attack. The approach uses rough set to find out feature reducts sets. Then reduct sets are sent to SVM to train and test data. The results showed that the proposed approach gives better and robust representation of data.

References
  1. Cohen, Fred, "Computer Viruses: Theory and Experiments," 7th DOD/NBS Computer Security Conference, Gaithersburg, MD, September 24-26, 1984.
  2. Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131.
  3. R. Power, “CSI/FBI computer crime & security survey,” Computer Security Journal, Vol.18, No.2, 2002, pp: 7-30.
  4. Rawat, S., Gulati V., Pujari A., A Fast Host-based Intrusion Detection System Using Rough Set Theory, Transaction on Rough Sets IV, LNCS 3700, 2005.
  5. Judy Weng, Glen Qin, “Network Intrusion Prevention Systems”, JTB_Journal of Technology and Business. October 2007.
  6. Helman, Paul, et al, Wynette, "Foundations of Intrusion Detection," The IEEE Computer Security Foundations Workshop V, 1992.
  7. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html.
  8. Z. Pawlak, Rough Sets, International Journal of Computer and Information Sciences, vol. 11, pp. 341-256, 1982.
  9. Wang Xuren, He Famei ,” Improving Intrusion Detection Performance Using Rough Set Theory and Association Rule Mining”, Hybrid Information Technology, 2006.
  10. Ohrn, A., Komorowski, J., A Rough Set Toolkit for Analysis of Data, In Proceedings of the third Joint conference on Information Sciences, Vol(3), USA, 1997, pp.403- 407, available on http://www.idi.ntnu.no/~aleks/rosetta.
  11. V. Vapnik, “The Nature of Statistical Learning Theory”. NY: Springer-Verlag. 1995.
  12. Zia Akbar,” Marketing data classification using Johnson’s Algorithm”, 2003
  13. Joachims T. “Estimating the Generalization Performance of a SVM Efficiently.” Proceedings of the International Conference on Machine Learning, Morgan Kaufman, 2000.
  14. Godinez, F., Hutter, D., Monroy R., Attribute Reduction for Effective Intrusion Detection, AWIC 2004, LNAI 3034, 2004.
  15. LIBSVM -- A Library for Support Vector Machines: www.csie.ntu.edu.tw/~cjlin/libsvm/
  16. Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, “Using Rough Set And Support Vector Machine for Network Intrusion Detection”, International Journal of Network Security & Its Applications (IJNSA),Vol 1 C. Chang and C. J. Lin, LIBSVM, No 1, April 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Rough Set Theory Support Vector Machine Feature Selection