Research Article
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System
457 downloads
@INPROCEEDINGS{10.1007/978-3-642-37949-9_42, author={Sanjiban Roy and V. Viswanatham and P. Krishna and N. Saraf and A. Gupta and Rajesh Mishra}, title={Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers}, proceedings_a={QSHINE}, year={2013}, month={7}, keywords={Intrusion Detection Network Attacks Rough Set Theory}, doi={10.1007/978-3-642-37949-9_42} }
- Sanjiban Roy
V. Viswanatham
P. Krishna
N. Saraf
A. Gupta
Rajesh Mishra
Year: 2013
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System
QSHINE
Springer
DOI: 10.1007/978-3-642-37949-9_42
Abstract
The very idea of intrusion detection can be perceived through the hasty advancement following the expansion and revolution of artificial intelligence and soft computingThus, in order to analyze, detect, identify and hold up network attacks a network intrusion detection system based on rough set theory has been proposed in this article. In this paper we have shown how the rough set technique can be applied to reduce the redundancies in the dataset and optimize the Intrusion Detection System (IDS).
Copyright © 2013–2024 ICST