DocumentCode
3708328
Title
Classification of cyber attacks based on rough set theory
Author
Adnan Amin;Sajid Anwar;Awais Adnan;Muhammad Aamir Khan;Zafar Iqbal
Author_Institution
Center for Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan
fYear
2015
Firstpage
1
Lastpage
6
Abstract
The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier´s accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.
Keywords
"Set theory","Classification algorithms","Computer crime","Genetic algorithms","Approximation methods","Yttrium"
Publisher
ieee
Conference_Titel
Anti-Cybercrime (ICACC), 2015 First International Conference on
Type
conf
DOI
10.1109/Anti-Cybercrime.2015.7351952
Filename
7351952
Link To Document