Classification of cyber attacks based on rough set theory

Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal
{"title":"Classification of cyber attacks based on rough set theory","authors":"Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal","doi":"10.1109/ANTI-CYBERCRIME.2015.7351952","DOIUrl":null,"url":null,"abstract":"The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于粗糙集理论的网络攻击分类
通过电脑、智能手机和其他电子设备将现代社会连接在一起的电信和信息网络的使用迅速增加,导致了安全威胁和网络犯罪活动。这些网络犯罪活动最终导致CC攻击分类成为网络安全领域的一个严重问题,而机器学习在入侵分类中得到了广泛的研究领域,其重点是提高分类器的准确率或提高数据挖掘模型的性能。本研究是利用粗糙集理论(RST)这一基于规则的决策方法提取入侵攻击分类规则的又一尝试。在公开数据上进行实验,探索遗传算法、覆盖算法、LEM2和穷举算法四种不同算法的性能。可以观察到,与其他提到的规则生成算法相比,基于遗传算法的规则生成RST分类产生了最好的性能。此外,通过将该方法应用于入侵攻击的公开数据集,结果表明该方法可以全面预测所有入侵攻击,并为安全工程师或开发人员提供预先的有用信息,以便进行授权操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new Chinese wall security policy model based on the subject's wall and object's wall Application of new alteration attack on biometric authentication systems Securing cognitive radio enabled smart grid systems against cyber attacks Website fingerprinting as a cybercrime investigation model: Role and challenges Toward an multidisciplinary curriculum in cyberscience
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1