Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 2
Page No. 415 - 422

Host-Based Intrusion Detection Architecture Based on Rough Set Theory and Machine Learning

Authors : Hayri Sever and Ahmed Nasser

References

Creech, G. and J. Hu, 2013. Generation of a new IDS test dataset: Time to retire the KDD collection. Proceedings of the 2013 IEEE International Conference on Wireless Communications and Networking (WCNC’13), April 7-10, 2013, IEEE, Shanghai, China, ISBN:978-1-4673-5938-2, pp: 4487-4492.

Creech, G. and J. Hu, 2014. A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE. Trans. Comput., 63: 807-819.
CrossRef  |  Direct Link  |  

Dash, M. and H. Liu, 1997. Feature selection for classification. Intell. Data Anal., 1: 131-156.
CrossRef  |  Direct Link  |  

Dua, S. and X. Du, 2016. Data Mining and Machine Learning in Cybersecurity. CRC Press, Boca Raton, Florida, USA., ISBN-13:978-1-4398-3943-0, Pages: 224.

Fawcett, T., 2006. An introduction to ROC analysis. Pattern Recognit. Lett., 27: 861-874.
CrossRef  |  Direct Link  |  

Garcia-Teodoro, P., J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur., 28: 18-28.
CrossRef  |  Direct Link  |  

Jia, X., L. Shang, B. Zhou and Y. Yao, 2016. Generalized attribute reduct in rough set theory. Knowl. Based Syst., 91: 204-218.
CrossRef  |  Direct Link  |  

Khreich, W., B. Khosravifar, A. Hamou-Lhadj and C. Talhi, 2017. An anomaly detection system based on variable N-gram features and one-class SVM. Inf. Software Technol., 91: 186-197.
CrossRef  |  Direct Link  |  

Lee, W., S.J. Stolfo and K.W. Mok, 1998. Mining Audit Data to Build Intrusion Detection Models. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD’98), August 27-31, 1998, Association for the Advancement of Artificial Intelligence (AAAI), Palo Alto, California, USA., pp: 66-72.

Li, H., D. Li, Y. Zhai, S. Wang and J. Zhang, 2016. A novel attribute reduction approach for multi-label data based on rough set theory. Inf. Sci., 367: 827-847.
CrossRef  |  Direct Link  |  

Liao, Y. and V.R. Vemuri, 2002. Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur., 21: 439-448.
CrossRef  |  

Miljkovic, D., 2010. Review of novelty detection methods. Proceedings of the 33rd International Conference on Convention MIPRO, May 24-28, 2010, IEEE, Opatija, Croatia, ISBN:978-1-4244-7763-0, pp: 593-598.

Mukherjee, S. and N. Sharma, 2012. Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol., 4: 119-128.
CrossRef  |  Direct Link  |  

Mulay, S.A., P.R. Devale and G.V. Garje, 2010. Intrusion detection system using support vector machine and decision tree. Intl. J. Comput. Appl., 3: 40-43.
Direct Link  |  

Pawlak, Z., 2012. Rough Sets: Theoretical Aspects of Reasoning about Data. Springer, Berlin, Germany, ISBN:978-94-010-5564-2, Pages: 229.

Pawlak, Z., 2012. Rough Sets: Theoretical Aspects of Reasoning about Data. Springer, Berlin, Germany, ISBN:978-94-010-5564-2, Pages: 229.

Stefanowski, J., 1998. The rough set based rule induction technique for classification problems. Proceedings of 6th European Conference on Intelligent Techniques and Soft Computing EUFIT Vol. 98, September 7-10, 1998, Aachen Publisher, Aachen, Germany, pp: 109-113.

Stefanowski, J., 2007. On Combined Classifiers, Rule Induction and Rough Sets. In: Transactions on Rough Sets VI., Peters, J.F., A. Skowron, I. Duntsch, J. Grzymala-Busse and E. Orlowska et al. (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-71198-8, pp: 329-350.

Tavallaee, M., E. Bagheri, W. Lu and A.A. Ghorbani, 2009. A detailed analysis of the KDD CUP 99 data set. Proceedings of the IEEE International Symposium on Computational Intelligence for Security and Defense Applications (CISDA’09), July 8-10, 2009, IEEE, Ottawa, Canada, ISBN:978-1-4244-3763-4, pp: 1-6.

Vijayanand, R., D. Devaraj and B. Kannapiran, 2017. Support vector machine based intrusion detection system with reduced input features for advanced metering infrastructure of smart grid. Proceedings of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), January 6-7, 2017, IEEE, Coimbatore, India, ISBN:978-1-5090-4559-4, pp: 1-7.

Wang, C., M. Shao, Q. He, Y. Qian and Y. Qi, 2016. Feature subset selection based on fuzzy neighborhood rough sets. Knowl. Based Syst., 111: 173-179.
CrossRef  |  Direct Link  |  

Wang, W., Z. Yang and M. Zhang, 2016. Intrusion Detection Technology based on Rough Set Attribute Reduction Theory. In: Human Centered Computing, Zu, Q. and B. Hu (Eds.). Springer, Cham, Switzerland, ISBN:978-3-319-31853-0, pp: 779-786.

Warrender, C., S. Forrest and B. Pearlmutter, 1999. Detecting intrusions using system calls: Alternative data models. Proceedings of the 1999 IEEE International Symposium on Security and Privacy, May 14, 1999, IEEE, Oakland, California, USA., pp: 133-145.

Witten, I.H., E. Frank, M.A. Hall and C.J. Pal, 2016. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Publishers Company, New York, USA.,.

Xie, M. and J. Hu, 2013. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD. Proceedings of the 6th International Congress on Image and Signal Processing (CISP) Vol. 3, December 16-18, 2013, IEEE, Hangzhou, China, ISBN:978-1-4799-2764-7, pp: 1711-1716.

Xie, M., J. Hu and J. Slay, 2014. Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), August, 19-21, 2014, IEEE, Xiamen, China, ISBN:978-1-4799-5148-2, pp: 978-982.

Xie, M., J. Hu, X. Yu and E. Chang, 2014. Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD. In: Proceedings of the International Conference on Network and System Security, Au, M.H., B. Carminati and C.C.J. Kuo (Eds.). Springer, Cham, Switzerland, ISBN:978-3-319-11697-6, pp: 542-549.

Xie, M., J. Hu, X. Yu and E. Chang, 2014. Evaluating host-based anomaly detection systems: Application of the frequency-based algorithms to ADFA-LD. In: Proceedings of the International Conference on Network and System Security, Au, M.H., B. Carminati and C.C.J. Kuo (Eds.). Springer, Cham, Switzerland, ISBN:978-3-319-11697-6, pp: 542-549.

Zhang, L.H., G.H. Zhang, L. Yu, J. Zhang and Y.C. Bai, 2004. Intrusion detection using rough set classification. J. Zhejiang Univ. Sci. A., 5: 1076-1086.
CrossRef  |  PubMed  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved