Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted trafficOn detection of such sign triggers of IDS to report them generate the alerts. These alerts are presented to a human analyst who evaluates them and initiates an adequate response. In Practice, IDSs have been observed to trigger thousands of alerts per day, most of which are mistakenly triggered by begin events such as false positive. This makes it extremely difficult for the analyst to correctly identify alerts related to attack such as a true positive. Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection. Intrusion detection systems aim to identify attacks with a high detection rate and a low false positive. We use RST (Rough Set Theory) and Incremental SVM (Support Vector Machine) to detect intrusions. First, RST is used to preprocess the data and reduce the dimensions. Next, the features were selected by RST will be sent to SVM model to learn and test respectively. The
[1]
Tao Li,et al.
Distributed agents model for intrusion detection based on AIS
,
2009,
Knowl. Based Syst..
[2]
Young U. Ryu,et al.
The management of intrusion detection: Configuration, inspection, and investment
,
2009,
Eur. J. Oper. Res..
[3]
Pingzhi Fan,et al.
A feasible intrusion detector for recognizing IIS attacks based on neural networks
,
2008,
Comput. Secur..
[4]
Gabriel Maciá-Fernández,et al.
Anomaly-based network intrusion detection: Techniques, systems and challenges
,
2009,
Comput. Secur..
[5]
A. Halim Zaim,et al.
A hybrid intrusion detection system design for computer network security
,
2009,
Comput. Electr. Eng..
[6]
Rachid Beghdad,et al.
Critical study of neural networks in detecting intrusions
,
2008,
Comput. Secur..
[7]
Hervé Debar,et al.
A logic-based model to support alert correlation in intrusion detection
,
2009,
Inf. Fusion.