2003
DOI: 10.1111/1468-0394.00249
|View full text |Cite
|
Sign up to set email alerts
|

A rough set theory based method for anomaly intrusion detection in computer network systems

Abstract: Intrusion detection is important in the defensein-depth network security framework. This paper presents an effective method for anomaly intrusion detection with low overhead and high efficiency. The method is based on rough set theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a process. It is capable of detecting the abnormal operating status of a process and thus reporting a possible intrusion. C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…It follows that (U, K) is a covering approximation space. (2). On the other hand, for each u ∈ U, there is ∈ A such that u ∈ K˛since K is a cover of U, hence (u, ˛) ∈ R, and so ˛∈ uR / = Ø from Remark 2.2(2).…”
Section: Proofmentioning
confidence: 95%
See 4 more Smart Citations
“…It follows that (U, K) is a covering approximation space. (2). On the other hand, for each u ∈ U, there is ∈ A such that u ∈ K˛since K is a cover of U, hence (u, ˛) ∈ R, and so ˛∈ uR / = Ø from Remark 2.2(2).…”
Section: Proofmentioning
confidence: 95%
“…(2) The formal context (U, A, R) is called to be regular if for each u ∈ U and each ˛ ∈ A, uR / = Ø and R˛ / = Ø, where uR = {ˇ ∈ A : (u, ) ∈ R} and R˛ = {v ∈ U : (v, ˛) ∈ R}. Remark 2.2.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations