Application of Rough Set Theory to Intrusion Detection System.
Xuren WangFamei HeLizhen LiuPublished in: GrC (2007)
Keyphrases
- rough set theory
- intrusion detection system
- rough sets
- intrusion detection
- decision rules
- decision table
- distributed intrusion detection
- network security
- anomaly detection
- tool for data mining
- attribute reduction
- rough fuzzy
- knowledge discovery
- rule generation
- granular computing
- data mining
- network intrusion detection
- rule extraction
- real world
- equivalence relation
- network traffic
- data mining techniques
- decision making