Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System

Download
391 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_42,
        author={Sanjiban Roy and V. Viswanatham and P. Krishna and N. Saraf and A. Gupta and Rajesh Mishra},
        title={Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Intrusion Detection Network Attacks Rough Set Theory},
        doi={10.1007/978-3-642-37949-9_42}
    }
    
  • Sanjiban Roy
    V. Viswanatham
    P. Krishna
    N. Saraf
    A. Gupta
    Rajesh Mishra
    Year: 2013
    Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_42
Sanjiban Roy1,*, V. Viswanatham1,*, P. Krishna1,*, N. Saraf1,*, A. Gupta1,*, Rajesh Mishra2,*
  • 1: VIT University
  • 2: Gautam Buddha University
*Contact email: s.roy@vit.ac.in, vmadhuviswanatham@vit.ac.in, pvenkatakrishna@vit.ac.in, nkhlsrf@gmail.com, akku.gupta@gmail.com, raj25mis@gmail.com

Abstract

The very idea of intrusion detection can be perceived through the hasty advancement following the expansion and revolution of artificial intelligence and soft computingThus, in order to analyze, detect, identify and hold up network attacks a network intrusion detection system based on rough set theory has been proposed in this article. In this paper we have shown how the rough set technique can be applied to reduce the redundancies in the dataset and optimize the Intrusion Detection System (IDS).