Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System

The very idea of intrusion detection can be perceived through the hasty advancement following the expansion and revolution of artificial intelligence and soft computing. Thus, in order to analyze, detect, identify and hold up network attacks a network intrusion detection system based on rough set theory has been proposed in this article. In this paper we have shown how the rough set technique can be applied to reduce the redundancies in the dataset and optimize the Intrusion Detection System (IDS).

[1]  Jerzy W. Grzymala-Busse,et al.  Rough Sets , 1995, Commun. ACM.

[2]  J. Deogun,et al.  Concept approximations based on rough sets and similarity measures , 2001 .

[3]  Sanjiban Sekhar Roy,et al.  Cancer data investigation using variable precision Rough set with flexible classification , 2012, CCSEIT '12.

[4]  M. A. Maarof,et al.  Feature Selection Using Rough Set in Intrusion Detection , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.

[5]  Xiang Cheng,et al.  Attribute Reduction Method Applied to IDS , 2010, 2010 International Conference on Communications and Mobile Computing.