Fuzzy integrated rough set theory situation feature extraction of network security

Author:

Zhao Dongmei123,Song Huiqian12,Li Hong12

Affiliation:

1. College of Computer and Cyber Security, Hebei Normal University, Nanerhuan Road, Shijiazhuang, China

2. Hebei Key Laboratory of Network and Information Security, Shijiazhuang, China

3. Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security, Shijiazhuang, China

Abstract

The element extraction from network security condition is the foundation security awareness. Its excellence directly disturbsentire security system performance. In this paper we introduce fuzzy logic based rough set theory for extracting security conditional factors. The traditional extraction method of network security situation elements relies on a lot of prior knowledge. With the purpose of solving this issue, in this paper we proposed fuzzy rough set theory based featurerank matrix of neighborhood rough set. Additionally, we propose reduction based parallel algorithm that uses the concept of conditional entropy in order to constructs the feature rank matrix as well as, constructs the core attribute by using reduction rules, takes the threshold of standard deviation as the threshold, and redefines the multi threshold neighborhood of mixed data. The attack type recognition training is carried out on lib SVM, filtered classifier, j48 and random tree classifiers respectively. The results demonstrate that the proposed reduction based parallel algorithm can increase the accuracy of classification, shorten the modeling time, and show increased recall rate and decreased false alarm rate.

Publisher

IOS Press

Subject

Artificial Intelligence,General Engineering,Statistics and Probability

Reference16 articles.

1. Multimedia big data computing and Internet of Things applications: A taxonomy and process model;Kumari;Journal of Network and Computer Applications

2. Security and privacy for the internet of drones: Challenges and solutions;Lin;IEEE Communications Magazine

3. Efficient Symbolic and Numerical Attribute Reduction with Neighborhood Rough Sets;Qinghua;Pattern Recognition and Artificial Intelligence,2008

4. Recognition of Network Security Situation Elements Based on Depth Stack Encoder and Back Propagation Algorithm;Guang;Journal of Electronics & Information Technology,2019

5. Network SecuritySituation Element Extraction Method Based on Rough Set;Hongcheng;Computer & Digital Engineering,2014

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Application of Image Segmenting Technology Based on Fuzzy C-Means Algorithm in Competition Video Referee;IEEE Access;2024

2. Design of Campus Network Security Intelligent Monitoring System Based on BP Algorithm;2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN);2023-12-22

3. Railroad freight service quality evaluation system based on a logistic regression model;Applied Mathematics and Nonlinear Sciences;2023-06-13

4. Research on university laboratory network security based on Cloud Computing;Applied Mathematics and Nonlinear Sciences;2023-06-02

5. Research on knowledge representation and modeling of health management based on fuzzy ontology;Journal of Intelligent & Fuzzy Systems;2023-05-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3