About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System

Download(Requires a free EAI acccount)
518 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_42,
        author={Sanjiban Roy and V. Viswanatham and P. Krishna and N. Saraf and A. Gupta and Rajesh Mishra},
        title={Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Intrusion Detection Network Attacks Rough Set Theory},
        doi={10.1007/978-3-642-37949-9_42}
    }
    
  • Sanjiban Roy
    V. Viswanatham
    P. Krishna
    N. Saraf
    A. Gupta
    Rajesh Mishra
    Year: 2013
    Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_42
Sanjiban Roy1,*, V. Viswanatham1,*, P. Krishna1,*, N. Saraf1,*, A. Gupta1,*, Rajesh Mishra2,*
  • 1: VIT University
  • 2: Gautam Buddha University
*Contact email: s.roy@vit.ac.in, vmadhuviswanatham@vit.ac.in, pvenkatakrishna@vit.ac.in, nkhlsrf@gmail.com, akku.gupta@gmail.com, raj25mis@gmail.com

Abstract

The very idea of intrusion detection can be perceived through the hasty advancement following the expansion and revolution of artificial intelligence and soft computingThus, in order to analyze, detect, identify and hold up network attacks a network intrusion detection system based on rough set theory has been proposed in this article. In this paper we have shown how the rough set technique can be applied to reduce the redundancies in the dataset and optimize the Intrusion Detection System (IDS).

Keywords
Intrusion Detection Network Attacks Rough Set Theory
Published
2013-07-09
http://dx.doi.org/10.1007/978-3-642-37949-9_42
Copyright © 2013–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL