Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 219))

Abstract

This paper mainly discusses the application of rough-set theory in intrusion detection, establishes the rough-set intrusion detection system model by applying the attribute reduction algorithm of rough set to mine the intrusion detection data, and improves the reduction algorithm which is based on attribute frequency, enhancing the data mining efficiency, and helping obtain concise and efficient data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cai ZM, Guan XH (2003) New intrusion detection approach based on rough set theory. Chin J Comput 5(3):361–366

    MathSciNet  Google Scholar 

  2. Zhang WX, Wu WZ, Liang JY, Li DY (2001) Rough set theory and approach, 1st edn, vol 4(45). Science Press, Beijing, pp 89–90

    Google Scholar 

  3. Zeng HG (1996) Rough set theory and application-on the new approach of data reasoning, 1st edn, vol 78(34). Chongqing University Press, Chongqing, pp 3–5

    Google Scholar 

  4. G. Y. Wang (2001) Rough set theory and knowledge acquisition, 1st edn, vol 34(6). Xi’an Jiaotong University Press, Xi’an, pp 13–15

    Google Scholar 

  5. Wang ZH, Hu KY, Hu XJ (1998) Knowledge discovery review base on rough set theory. Pattern Recognit Artif Intell 6(2):176–183

    Google Scholar 

  6. Yao MC (2002) Study and implementation on the attribute reduction algorithm based on rough set. Harbin Institute of Technology. Master Degree Thesis 16(4):56–57

    Google Scholar 

  7. Tang Z, Cao JY (2009) SVM abnormal intrusion detection approach based on the rough set attribute reduction. Commun Technol 65(2):261–263

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuyue Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Ma, S., Liao, H., Yuan, Y. (2013). Intrusion Detection Based on Rough-Set Attribute Reduction. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 219. Springer, London. https://doi.org/10.1007/978-1-4471-4853-1_47

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4853-1_47

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4852-4

  • Online ISBN: 978-1-4471-4853-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics