The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection

作者: Zhicai Shi , Yongxiang Xia , Fei Wu , Jian Dai

DOI: 10.4304/JNW.9.6.1380-1387

关键词: Computer sciencePayload (computing)Simple (abstract algebra)DiscretizationCurrent (mathematics)Rough setProcess (computing)Data miningIntrusion detection systemDiscretization of continuous features

摘要: The data processed by intrusion detection systems usually is vague, uncertainty, imprecise and incomplete. Rough Set theory one of the best methods to process this kind data. But can only some discrete So with continuous numerical attributes must be discretized before they are used. Some current discretization algorithms classified reviewed in detail. mathematical descriptions problem given means theory. By fusing entropy we propose a simple fast algorithm based on information loss. applied different samples same from KDDcup99 systems. used reduce so as relieve payload experimental results show that proposed sensitive initial for part all condition attributes. dose not compromise effect it improves response performance model remarkably.

参考文章(16)
Sotiris Kotsiantis, Dimitris Kanellopoulos, Discretization Techniques: A recent survey ,(2006)
Randy Kerber, ChiMerge: discretization of numeric attributes national conference on artificial intelligence. pp. 123- 128 ,(1992)
Keki B. Irani, Usama M. Fayyad, Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning international joint conference on artificial intelligence. ,vol. 2, pp. 1022- 1027 ,(1993)
James Dougherty, Ron Kohavi, Mehran Sahami, Supervised and Unsupervised Discretization of Continuous Features Machine Learning Proceedings 1995. pp. 194- 202 ,(1995) , 10.1016/B978-1-55860-377-6.50032-3
Zhengmao Ye, Habib Mohamadian, Yongmao Ye, Information Loss Determination on Digital Image Compression and Reconstruction Using Qualitative and Quantitative Analysis Journal of Multimedia. ,vol. 6, pp. 486- 493 ,(2011) , 10.4304/JMM.6.6.486-493
Yu Liu, Fenghua Guo, Zhiping Jia, Hongjun Dai, A Malicious Node Detection Algorithm Based on Principle of Maximum Entropy in WSNs Journal of Networks. ,vol. 7, pp. 1376- 1383 ,(2012) , 10.4304/JNW.7.9.1376-1383
Chun-Fu Lin, Sheng-De Wang, Fuzzy support vector machines IEEE Transactions on Neural Networks. ,vol. 13, pp. 464- 471 ,(2002) , 10.1109/72.991432
Qin Qia, Zhiwen Wang, None, A New Attack Detection in Large Scale Network based on Entropy Journal of Networks. ,vol. 7, pp. 863- 868 ,(2012) , 10.4304/JNW.7.5.863-868
Nan Feng, Jing Xie, A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment Journal of Networks. ,vol. 7, pp. 337- 344 ,(2012) , 10.4304/JNW.7.2.337-344
ZDZISLAW PAWLAK, ROUGH SET THEORY AND ITS APPLICATIONS TO DATA ANALYSIS Cybernetics and Systems. ,vol. 29, pp. 661- 688 ,(1998) , 10.1080/019697298125470