Abstract
There are diverse and complex network attack forms in the world, although the attack forms cannot be predicted by the information system in advance, the system call sequence is stable and consistent. In this paper, the rough set attribute reduction theory is used to establish the normal behavior system call short sequence set forecasting model of network operating system, and the changes of the system call sequence are studied. When the network is attacked, the prediction model can automatically detect the degree that the system call sub-sequence deviates from the normal sequence, so as to detect the abnormal behavior or attack events.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guoyin, W., Yiyu, Y., Hong, Y.: A survey on rough set theory and applications. Chin. J. Comput. 7(32), 1229–1246 (2009)
Tengfei, Z., Jianmei, X., Xihuai, W.: Algorithms of attribute relative reduction in rough set theory. Acta Electronica Sinica. 11(33), 2080–2083 (2005)
Guojun, Z.: Research on Relative-Attribute Reduction Algorithm and Decision-Making Method Based on Rough Set. Huazhong University of Science and Technology, Wuhan (2010)
Danqing, D.: Algorithms and Key Technologies of Intrusion Detection System. A Dissertation Submitted for the Degree of Doctor of Philosophy Central South University, May 2007
Huixian, S.: Research on Analysis Model of Process Behavior. Master thesis submitted to University of Electronic Science and Technology of China, April 2013
Acknowledgment
This project is supported by the research program of educational technology in Zhejiang Province, JB 146; Zhejiang Institute of Security Technology, AF 201503.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Wang, W., Yang, Z., Zhang, M. (2016). Intrusion Detection Technology Based on Rough Set Attribute Reduction Theory. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_78
Download citation
DOI: https://doi.org/10.1007/978-3-319-31854-7_78
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31853-0
Online ISBN: 978-3-319-31854-7
eBook Packages: Computer ScienceComputer Science (R0)