Loading...
Please wait, while we are loading the content...
Similar Documents
Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine
| Content Provider | Semantic Scholar |
|---|---|
| Author | Shailendra, Kumar Shrivastava Preeti, Jain |
| Copyright Year | 2011 |
| Abstract | detection system is used to discover illegitimate and unnecessary behavior at accessing or manipulating computer systems. Subsequently, these behaviors are checked as an attack or normal behavior. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. Most of the earlier IDs make use of all the features in the packet to analyze and look for well-known intrusive models. Some of these features are unrelated and superfluous. The disadvantage of these methods is degrading the performance of IDs. The proposed Rough Set Support Vector Machine (RSSVM) approach is extensively decreases the computer resources like memory and CPU utilization which are required to identify an attack. The approach uses rough set to find out feature reducts sets. Then reduct sets are sent to SVM to train and test data. The results showed that the proposed approach gives better and robust representation of data. |
| Starting Page | 35 |
| Ending Page | 41 |
| Page Count | 7 |
| File Format | PDF HTM / HTML |
| DOI | 10.5120/2261-2906 |
| Volume Number | 18 |
| Alternate Webpage(s) | http://www.ijcaonline.org/volume18/number3/pxc3872906.pdf |
| Alternate Webpage(s) | https://doi.org/10.5120/2261-2906 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |