Classification of cyber attacks based on rough set theory

Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal
{"title":"Classification of cyber attacks based on rough set theory","authors":"Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal","doi":"10.1109/ANTI-CYBERCRIME.2015.7351952","DOIUrl":null,"url":null,"abstract":"The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.
基于粗糙集理论的网络攻击分类
通过电脑、智能手机和其他电子设备将现代社会连接在一起的电信和信息网络的使用迅速增加,导致了安全威胁和网络犯罪活动。这些网络犯罪活动最终导致CC攻击分类成为网络安全领域的一个严重问题,而机器学习在入侵分类中得到了广泛的研究领域,其重点是提高分类器的准确率或提高数据挖掘模型的性能。本研究是利用粗糙集理论(RST)这一基于规则的决策方法提取入侵攻击分类规则的又一尝试。在公开数据上进行实验,探索遗传算法、覆盖算法、LEM2和穷举算法四种不同算法的性能。可以观察到,与其他提到的规则生成算法相比,基于遗传算法的规则生成RST分类产生了最好的性能。此外,通过将该方法应用于入侵攻击的公开数据集,结果表明该方法可以全面预测所有入侵攻击,并为安全工程师或开发人员提供预先的有用信息,以便进行授权操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信