A rough set-based effective rule generation method for classification with an application in intrusion detection.
Prasanta GogoiDhruba K. BhattacharyyaJugal K. KalitaPublished in: Int. J. Secur. Networks (2013)
Keyphrases
- intrusion detection
- generation method
- intrusion detection system
- rule sets
- anomaly detection
- network intrusion detection
- network security
- network traffic
- detecting anomalous
- credit card fraud detection
- pattern recognition
- classification accuracy
- association rules
- text classification
- support vector
- data mining
- network intrusion
- artificial immune
- computer security
- cyber security
- high detection rate
- rough sets
- data mining techniques
- false positives and false negatives
- network intrusion detection systems
- feature selection
- alert correlation
- information security
- feature space
- decision trees
- machine learning
- network attacks
- nsl kdd
- false positives
- face detection
- model selection
- dimensionality reduction
- supervised learning
- knowledge discovery
- feature extraction
- information retrieval