Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain

作者: Marek Pawlicki , Michał Choraś , Rafał Kozik

DOI: 10.1145/3230833.3233259

关键词:

摘要: As the importance of data stored in daily-use information system grows, so does damage a malicious user could inflict. Network traffic can be notoriously complicated and prone to fluctuations. With prevailing risk cybersecurity breaches, improving detection algorithms is utmost importance. Advanced systems using various facets artificial intelligence machine learning exist. We look forward Granular Computing (GrC) as novel, promising way improve network classification, intrusion reduction computational cost real time analysis. In this paper, aquick primer on granular computing offered, its properties abstracting into meaningful, compact packages named granules are looked into. The basic principles granule creation explained. Consecutively, survey most recent implementations presented, with analysis how certain aspects utilized solve particular real-world problems. multiple cases, techniques GrC allow for an increase efficiency calculating speed, better legibility improvements performance classifier granulated supplied to. examined approaches then taxonomised regard purpose granulation, aspect Computing.

参考文章(20)
Tsau Young (’T. Y.’) Lin, Churn-Jung Liau, Granular Computing and Rough Sets Data Mining and Knowledge Discovery Handbook. pp. 535- 561 ,(2005) , 10.1007/0-387-25465-X_24
Yiyu Yao, The Art of Granular Computing Rough Sets and Intelligent Systems Paradigms. pp. 101- 112 ,(2007) , 10.1007/978-3-540-73451-2_12
Wenyue Sun, Jianhua Zhang, Rubin Wang, Predicting electrical power output by using Granular Computing based Neuro-Fuzzy modeling method chinese control and decision conference. pp. 2865- 2870 ,(2015) , 10.1109/CCDC.2015.7162415
Mohammed Al-Shammaa, Maysam F. Abbod, Granular computing approach for the design of medical data classification systems computational intelligence in bioinformatics and computational biology. pp. 1- 7 ,(2015) , 10.1109/CIBCB.2015.7300328
Gary McGraw, Greg Morrisett, Attacking Malicious Code: A Report to the Infosec Research Council IEEE Software. ,vol. 17, pp. 33- 41 ,(2000) , 10.1109/52.877857
Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, Ali Hamzeh, A survey on heuristic malware detection techniques conference on information and knowledge technology. pp. 113- 120 ,(2013) , 10.1109/IKT.2013.6620049
Witold Pedrycz, Wladyslaw Homenda, Building the fundamentals of granular computing: A principle of justifiable granularity soft computing. ,vol. 13, pp. 4209- 4218 ,(2013) , 10.1016/J.ASOC.2013.06.017
Lorenzo Livi, Alireza Sadeghian, Data granulation by the principles of uncertainty Pattern Recognition Letters. ,vol. 67, pp. 113- 121 ,(2015) , 10.1016/J.PATREC.2015.04.008
A. Bargiela, W. Pedrycz, The roots of granular computing granular computing. pp. 806- 809 ,(2006) , 10.1109/GRC.2006.1635922