Using Rough Set and Support Vector Machine for Network Intrusion Detection

Computer Science – Learning

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

13 Pages

Scientific paper

The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain system inefficiently. In this paper, we use RST (Rough Set Theory) and SVM (Support Vector Machine) to detect intrusions. First, RST is used to preprocess the data and reduce the dimensions. Next, the features were selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments will compare the results with different methods and show RST and SVM schema could improve the false positive rate and accuracy.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Using Rough Set and Support Vector Machine for Network Intrusion Detection does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Using Rough Set and Support Vector Machine for Network Intrusion Detection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using Rough Set and Support Vector Machine for Network Intrusion Detection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-636804

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.