A Rough Set Based Feature Selection on KDD CUP 99 Data Set

In the present era as internet is growing with exponential pace, computer security has become a critical issue. In recent times data mining and machine learning have been researched extensively for intrusion detection with the aim of improving the accuracy of detection classifier. KDD CUP’ 99 Data set is the most widely used dataset in research domain. Selecting important feature on the basis of rough set based feature selection approach have lead to a simplification of the problem, faster and more accurate detection rates. In this paper, we presented an efficient approach for detecting relevant features from the KDD CUP’99 Data set.

[1]  C. J. V. Rijsbergen,et al.  Rough Sets, Fuzzy Sets and Knowledge Discovery , 1994, Workshops in Computing.

[2]  Akhilesh Tiwari,et al.  A Novel Data Mining based Hybrid Intrusion Detection Framework , 2014 .

[3]  Reyadh Naoum,et al.  Significant of features selection for detecting network intrusions , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[4]  John R. Anderson,et al.  MACHINE LEARNING An Artificial Intelligence Approach , 2009 .

[5]  Adetunmbi A. Olusola,et al.  Analysis of KDD '99 Intrusion Detection Dataset for Selection of Relevance Features , 2010 .

[6]  Tang Jian-guo On finding core and reduction in rough set theory , 2003 .

[7]  Roman Słowiński,et al.  Intelligent Decision Support , 1992, Theory and Decision Library.

[8]  E. L. Harder,et al.  The Institute of Electrical and Electronics Engineers, Inc. , 2019, 2019 IEEE International Conference on Software Architecture Companion (ICSA-C).

[9]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[10]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .

[11]  A. S. Raut,et al.  Feature Selection for Anomaly-Based Intrusion Detection using Rough Set Theory , 2014 .

[12]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[13]  Andrew H. Sung,et al.  Feature Selection for Intrusion Detection with Neural Networks and Support Vector Machines , 2003 .