85
Views
1
CrossRef citations to date
0
Altmetric
Articles

Integration of rough sets and support vector machines for network intrusion detection

&
Pages 425-432 | Received 16 Jun 2014, Accepted 23 Sep 2014, Published online: 31 Oct 2014

References

  • Agrawal, R. and R. Srikant, “Fast algorithms for mining association rules,” Proceeding of the 20th International Conference of Very Large Data Bases, San Francisco, CA, 487–499 (1994).
  • Ahn, B. S., S. S. Cho and C. Y. Kim, “The integrated methodology of rough set theory and artificial neural network for business failure prediction,” Expert Systems with Applications, 18, 65–74 (2000).10.1016/S0957-4174(99)00053-6
  • Anderson, J., An Introduction To Neural Networks, MIT Press, Cambridge (1995).
  • Bai, S. and X. Dai, “An efficiency apriori algorithm: P_matrix algorithm,” Proceeding ISDPE ‘07 Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, Washington, DC, 101–103 (2007).
  • Barbara, D., J. Couto, S. Jajodia, L. Popyack and N. Wu, “ADAM: Detecting intrusions by data mining,” Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY, 11–16, (2001).
  • Bartkowiak, A., “Anomaly, novelty, one-class classification: A comprehensive introduction,” International Journal of Computer Systems and Industrial Management Applications, 3, 61–71 (2011).
  • Batuwita, R. and V. Palade, “FSVM-CIL: Fuzzy support vector machines for class imbalance learning,” IEEE Transactions on Fuzzy Systems, 18, 558–571 (2010).10.1109/TFUZZ.2010.2042721
  • Beynon, M. J. and M. J. Peel, “Variable precision rough set theory and data discretisation: An application to corporate failure prediction,” Omega, 29, 561–576 (2001).10.1016/S0305-0483(01)00045-7
  • Breiman, L., J. H. Friedman, R. A. Olshen and C. J. Stone, Classification and Regression Trees, Wadsworth & Brooks/Cole Advanced Books & Software, Monterey, CA (1984).
  • Burges, C., “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge Discovery, 2, 121–167 (1998).10.1023/A:1009715923555
  • Cannady, J. “Artificial neural networks for misuse detection,” Proceedings of the 1998 National Information Systems Security Conference (NISSC’98), Arlington, TX, 443–456 (1998).
  • Chebrolu, S., A. Abraham and J. P. Thomas, “Feature deduction and ensemble design of intrusion detection systems,” Computers & Security, 24, 295–307 (2005).
  • Chen, D., Q. He and X. Wang, “FRSVMs: Fuzzy rough set based support vector machines,” Fuzzy Sets and Systems, 161, 596–607 (2010).10.1016/j.fss.2009.04.007
  • Chen, W. H., S. H. Hsu and H. P. Shen, “Application of SVM and ANN for intrusion detection,” Computers & Operations Research, 32, 2617–2634 (2005).
  • Chitrakar, R. and C. Huang, “Selection of candidate support vectors in incremental SVM for network intrusion detection,” Computers & Security, 45, 231–241 (2014).
  • Cho, S. B., “Incorporating soft computing techniques into a probabilistic intrusion detection system,” IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 32, 154–160 (2002).
  • Dickerson, J. E. and J. E. Dickerson, “Fuzzy network profiling for intrusion detection,” Proceedings of NAFIPS 19th International Conference of the North American Fuzzy Information Processing Society, Atlanta, GA, 301–306 (2000).
  • Dimitras, A. I., R. Slowinski, R. Susmaga and C. Zopounidis, “Business failure prediction using rough sets,” European Journal of Operational Research, 114, 263–280 (1999).10.1016/S0377-2217(98)00255-0
  • Drucker, H., D. Donghui Wu and V. N. Vapnik, “Support vector machines for spam categorization,” IEEE Transactions on Neural Networks, 10, 1048–1054 (1999).10.1109/72.788645
  • Gogoi, P., D. K. Bhattacharyya and J. K. Kalita, “A rough set–based effective rule generation method for classification with an application in intrusion detection,” International Journal of Security and Networks, 8, 61–71 (2013).10.1504/IJSN.2013.055939
  • Gomez, J. and D. Dasgupta, “Evolving fuzzy classifiers for intrusion detection,” Proceeding of third Annual Information Assurance Workshop, 17–19, (2002).
  • Grzymala-Busse, J. W., “Knowledge acquisition under uncertainty – A rough set approach,” Journal of Intelligent and Robotic Systems, 1, 3–16 (1988).10.1007/BF00437317
  • Hashemi, R. R., L. A. Le Blanc, C. T. Rucks and A. Rajaratnam, “A hybrid intelligent system for predicting bank holding structures,” European Journal of Operational Research, 109, 390–402 (1998).10.1016/S0377-2217(98)00065-4
  • Kemmerer, R. A. and G. Vigna, “Intrusion detection: A brief history and overview,” IEEE Security and Privacy Magazine, 35, 27–30 (2002).
  • Kumar, S. and E. H. Spafford, A Software Architecture to Support Misuse Intrusion Detection, Computer Science Technical Reports, Purdue University, Lafayette, LA (1995).
  • Kumar, G., K. Kumar and M. Sachdeva, “The use of artificial intelligence based techniques for intrusion detection: A review,” Artificial Intelligence Review, 34, 369–387 (2010).10.1007/s10462-010-9179-5
  • Lei, J. Z. and A. Ghorbani, “Network intrusion detection using an improved competitive learning neural network,” Proceeding In Communication Networks and Services Research, 190–197, (2004).
  • McKee, T. E. and T. Lensberg, “Genetic programming and rough sets: A hybrid approach to bankruptcy classification,” European Journal of Operational Research, 138, 436–451 (2002).10.1016/S0377-2217(01)00130-8
  • Mukkamala, S., A. H. Sung and A. Abraham, “Modeling intrusion detection systems using linear genetic programming approach,” Proceeding of Innovations in Applied Artificial Intelligence, Ottawa, 633–642, (2004).
  • Mukkamala, S. and A. H. Sung, “A comparative study of techniques for intrusion detection,” Proceedings of the 15th IEEE international conference on tools with artificial intelligence (ICTAI’03), Washington, DC, 570–577(2003).
  • Pawlak, Z., “Rough sets,” International Journal of Computer & Information Sciences, 11, 341–356 (1982).10.1007/BF01001956
  • Pawlak, Z., Rough Sets, Kluwer Academic Publishers, Norwell, MA (1991).10.1007/978-94-011-3534-4
  • Pawlak, Z., J. Grzymala-Busse, R. Slowinski and W. Ziarko, “Rough sets,” Communications of the ACM, 38, 88–95 (1995).10.1145/219717.219791
  • Peddabachigari, S., A. Abraham, C. Grosan and J. Thomas, “Modeling intrusion detection system using hybrid intelligent systems,” Journal of Network and Computer Applications, 30, 114–132 (2007).10.1016/j.jnca.2005.06.003
  • Quinlan, R. J., “Father absence, parental care, and female reproductive development,” Evolution and Human Behavior, 24, 376–390 (2003).10.1016/S1090-5138(03)00039-4
  • Rhodes, B., J. Mahaffey and J. Cannady, “Multiple self-organizing maps for intrusion detection,” Proceedings of the 23rd national information systems security conference, Baltimore, MD (2000).
  • Rowley, H. A., S. Baluja and T. Kanade, “Neural network-based face detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 23–38 (1998).10.1109/34.655647
  • Schölkopf, B., J. C. Platt, J. Shawe-Taylor, A. J. Smola and R. C. Williamson, “Estimating the support of a high-dimensional distribution,” Neural Computation, 13, 1443–1471 (2001).10.1162/089976601750264965
  • Shah, K., N. Dave, S. Chavan, S. Mukherjee, A. Abraham and S. Sanyal, “Adaptive neuro-fuzzy intrusion detection system,” IEEE International Conference on Information Technology: Coding and Computing (ITCC’ 04), Washington, DC, USA, IEEE Computer Society, 70–74(2004).
  • Slowinski, R. and C. Zopounidis, “Application of the rough set approach to evaluation of bankruptcy risk,” Intelligent Systems in Accounting, Finance and Management, 4, 27–41 (1995).10.1002/j.1099-1174.1995.tb00078.x
  • Tavallaee, M., E. Bagheri, W. Lu and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications, New Jersey, NJ (2009).
  • Tiwari, P., Intrusion detection technical report, Department of Electrical Engineering Indian institute of Technology, Delhi (2002).
  • Tsai, C. F., Y. F. Hsu, C. Y. Lin and W. Y. Lin, “Intrusion detection by machine learning: A review,” Expert Systems with Applications, 36, 11994–12000 (2009).10.1016/j.eswa.2009.05.029
  • Toosi, A. N. and M. Kahani, “A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers,” Computer Communications, 30, 2201–2212 (2007).10.1016/j.comcom.2007.05.002
  • Vapnik, V. N., The Nature of Statistical Learning Theory, Springer-Verlag, New York, NY (1995).10.1007/978-1-4757-2440-0
  • Vapnik, V., Statistical Learning Theory, Wiley, New York, NY (1998).
  • Visumathi, J., K. L. Shanmuganathan and K. M. Junaid, “Misuse and anomaly-based network intrusion detection system using fuzzy and genetic classification algorithms,” Fuzzy Systems, 4, 137–141 (2012).
  • Walczak, B. and D. L. Massart, “Rough sets theory,” Chemometrics and Intelligent Laboratory Systems, 47(1), 1–16 (1999).10.1016/S0169-7439(98)00200-7
  • Yang, X., Q. Song and Y. Wang, “A weighted support vector machine for data classification,” International Journal of Pattern Recognition and Artificial Intelligence, 21, 961–976 (2007).10.1142/S0218001407005703
  • Yao, J. T., S. Zhao and L. Fan, “An enhanced support vector machine model for intrusion detection,” Lecture Notes in Computer Science, 4062, 538–543 (2006).10.1007/11795131
  • Zanero, S. and S. M. Savaresi, “Unsupervised learning techniques for an intrusion detection system,” Proceedings of the 2004 ACM Symposium on Applied Computing, 412–419 (2004).10.1145/967900
  • Zhang, J. and Y. Wang, “A rough margin based support vector machine,” Information Sciences, 178(9), 2204–2214 (2008).10.1016/j.ins.2007.12.012
  • Zhou, G. and A. Shrestha, “Efficient intrusion detection scheme based on SVM,” Journal of Networks, 8, 2128–2134 (2013).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.