Abstract
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers – masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the use pattern of a mobile’s user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Yongguang, Z., Wenke, L., Yi-An, H.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks Journal 9(5), 545–556 (2003)
Bo, S., Fei, Y., Kui, W., Vicot, C.-.M.L.: Mobility-Based Anomaly Detection in Cellular Mobile Networks. In: Workshop on Wireless Security, pp. 61–69 (2004)
Oleg, K., Ratan, G.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: HICSS, p. 57.1 (2003)
Jonathan, G., Dipankar, D.: Evolving Fuzzy Classifiers for Intrusion Detection. pp. GECCO, vol. (1), pp. 1150–1161 (2004)
Tsau Y.L.: Anamoly Detection - A Soft Computing Approach. In: Proceedings in the ACM SIGSAC New Security Paradigm Workshop, pp. 44–53 (1994)
Richard, J., Qiang, S.: Rough and Fuzzy Sets for Dimensionality Reduction. In: Proceedings of the 11th Int. Conf. on Fuzzy Systems, pp. 29–34 (2002)
Zdzilaw, P.: Rough Sets Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Dordrecht (1991)
Ron, K., Brian, F.: Useful Feature Subsets and Rough Set Reducts. In: The International Workshop on Rough Sets and Soft Computing, pp. 310–317 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bae, IH., Lee, HJ., Lee, KS. (2006). Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11892960_59
Download citation
DOI: https://doi.org/10.1007/11892960_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46535-5
Online ISBN: 978-3-540-46536-2
eBook Packages: Computer ScienceComputer Science (R0)