Skip to main content

Intrusion Detection Technology Based on Rough Set Attribute Reduction Theory

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9567))

Included in the following conference series:

  • 1520 Accesses

Abstract

There are diverse and complex network attack forms in the world, although the attack forms cannot be predicted by the information system in advance, the system call sequence is stable and consistent. In this paper, the rough set attribute reduction theory is used to establish the normal behavior system call short sequence set forecasting model of network operating system, and the changes of the system call sequence are studied. When the network is attacked, the prediction model can automatically detect the degree that the system call sub-sequence deviates from the normal sequence, so as to detect the abnormal behavior or attack events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guoyin, W., Yiyu, Y., Hong, Y.: A survey on rough set theory and applications. Chin. J. Comput. 7(32), 1229–1246 (2009)

    MathSciNet  Google Scholar 

  2. Tengfei, Z., Jianmei, X., Xihuai, W.: Algorithms of attribute relative reduction in rough set theory. Acta Electronica Sinica. 11(33), 2080–2083 (2005)

    Google Scholar 

  3. Guojun, Z.: Research on Relative-Attribute Reduction Algorithm and Decision-Making Method Based on Rough Set. Huazhong University of Science and Technology, Wuhan (2010)

    Google Scholar 

  4. Danqing, D.: Algorithms and Key Technologies of Intrusion Detection System. A Dissertation Submitted for the Degree of Doctor of Philosophy Central South University, May 2007

    Google Scholar 

  5. Huixian, S.: Research on Analysis Model of Process Behavior. Master thesis submitted to University of Electronic Science and Technology of China, April 2013

    Google Scholar 

Download references

Acknowledgment

This project is supported by the research program of educational technology in Zhejiang Province, JB 146; Zhejiang Institute of Security Technology, AF 201503.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wuqi Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, W., Yang, Z., Zhang, M. (2016). Intrusion Detection Technology Based on Rough Set Attribute Reduction Theory. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31854-7_78

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31853-0

  • Online ISBN: 978-3-319-31854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics