Abstract:Intrusion detection is important in the defensein-depth network security framework. This paper presents an effective method for anomaly intrusion detection with low overhead and high efficiency. The method is based on rough set theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a process. It is capable of detecting the abnormal operating status of a process and thus reporting a possible intrusion. C… Show more
“…It follows that (U, K) is a covering approximation space. (2). On the other hand, for each u ∈ U, there is ∈ A such that u ∈ K˛since K is a cover of U, hence (u, ˛) ∈ R, and so ˛∈ uR / = Ø from Remark 2.2(2).…”
Section: Proofmentioning
confidence: 95%
“…(2) The formal context (U, A, R) is called to be regular if for each u ∈ U and each ˛ ∈ A, uR / = Ø and R˛ / = Ø, where uR = {ˇ ∈ A : (u, ) ∈ R} and R˛ = {v ∈ U : (v, ˛) ∈ R}. Remark 2.2.…”
Section: Preliminariesmentioning
confidence: 99%
“…(2) Let a disease feature ˛ ∈ A. By Definition 1.1 (2), there is a person u ∈ U such that u have the disease feature ˛, i.e., (u, ˛) ∈ R. By Remark 2.2(2), u ∈ R˛. It follows that R˛ / = Ø.…”
Section: Preliminariesmentioning
confidence: 99%
“…Then (U, K) is called to be induced by (U, A, R). (2) Let (U, K) be a covering approximation space and let (U, A, R) be a regular formal context obtained by Proposition 2.7 (2). Then (U, A, R) is called to be induced by (U, K).…”
Section: Definition 28mentioning
confidence: 99%
“…(2) In this section, a covering approximation space (U, K) is always supposed to be endowed covering approximation operators C and C.…”
“…It follows that (U, K) is a covering approximation space. (2). On the other hand, for each u ∈ U, there is ∈ A such that u ∈ K˛since K is a cover of U, hence (u, ˛) ∈ R, and so ˛∈ uR / = Ø from Remark 2.2(2).…”
Section: Proofmentioning
confidence: 95%
“…(2) The formal context (U, A, R) is called to be regular if for each u ∈ U and each ˛ ∈ A, uR / = Ø and R˛ / = Ø, where uR = {ˇ ∈ A : (u, ) ∈ R} and R˛ = {v ∈ U : (v, ˛) ∈ R}. Remark 2.2.…”
Section: Preliminariesmentioning
confidence: 99%
“…(2) Let a disease feature ˛ ∈ A. By Definition 1.1 (2), there is a person u ∈ U such that u have the disease feature ˛, i.e., (u, ˛) ∈ R. By Remark 2.2(2), u ∈ R˛. It follows that R˛ / = Ø.…”
Section: Preliminariesmentioning
confidence: 99%
“…Then (U, K) is called to be induced by (U, A, R). (2) Let (U, K) be a covering approximation space and let (U, A, R) be a regular formal context obtained by Proposition 2.7 (2). Then (U, A, R) is called to be induced by (U, K).…”
Section: Definition 28mentioning
confidence: 99%
“…(2) In this section, a covering approximation space (U, K) is always supposed to be endowed covering approximation operators C and C.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.