Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values

  • Ihn-Han Bae
  • Hwa-Ju Lee
  • Kyung-Sook Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4251)


The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers – masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the use pattern of a mobile’s user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation.


False Alarm Rate Intrusion Detection Anomaly Detection Weighted Feature Deviation Threshold 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yongguang, Z., Wenke, L., Yi-An, H.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks Journal 9(5), 545–556 (2003)CrossRefGoogle Scholar
  2. 2.
    Bo, S., Fei, Y., Kui, W., Vicot, C.-.M.L.: Mobility-Based Anomaly Detection in Cellular Mobile Networks. In: Workshop on Wireless Security, pp. 61–69 (2004)Google Scholar
  3. 3.
    Oleg, K., Ratan, G.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: HICSS, p. 57.1 (2003)Google Scholar
  4. 4.
    Jonathan, G., Dipankar, D.: Evolving Fuzzy Classifiers for Intrusion Detection. pp. GECCO, vol. (1), pp. 1150–1161 (2004) Google Scholar
  5. 5.
    Tsau Y.L.: Anamoly Detection - A Soft Computing Approach. In: Proceedings in the ACM SIGSAC New Security Paradigm Workshop, pp. 44–53 (1994) Google Scholar
  6. 6.
    Richard, J., Qiang, S.: Rough and Fuzzy Sets for Dimensionality Reduction. In: Proceedings of the 11th Int. Conf. on Fuzzy Systems, pp. 29–34 (2002)Google Scholar
  7. 7.
    Zdzilaw, P.: Rough Sets Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Dordrecht (1991)Google Scholar
  8. 8.
    Ron, K., Brian, F.: Useful Feature Subsets and Rough Set Reducts. In: The International Workshop on Rough Sets and Soft Computing, pp. 310–317 (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ihn-Han Bae
    • 1
  • Hwa-Ju Lee
    • 1
  • Kyung-Sook Lee
    • 1
  1. 1.School of Computer and Information Communication Eng.Catholic University of DaeguGyeongSanKorea

Personalised recommendations