Skip to main content

Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Abstract

The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers – masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the use pattern of a mobile’s user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yongguang, Z., Wenke, L., Yi-An, H.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks Journal 9(5), 545–556 (2003)

    Article  Google Scholar 

  2. Bo, S., Fei, Y., Kui, W., Vicot, C.-.M.L.: Mobility-Based Anomaly Detection in Cellular Mobile Networks. In: Workshop on Wireless Security, pp. 61–69 (2004)

    Google Scholar 

  3. Oleg, K., Ratan, G.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: HICSS, p. 57.1 (2003)

    Google Scholar 

  4. Jonathan, G., Dipankar, D.: Evolving Fuzzy Classifiers for Intrusion Detection. pp. GECCO, vol. (1), pp. 1150–1161 (2004)

    Google Scholar 

  5. Tsau Y.L.: Anamoly Detection - A Soft Computing Approach. In: Proceedings in the ACM SIGSAC New Security Paradigm Workshop, pp. 44–53 (1994)

    Google Scholar 

  6. Richard, J., Qiang, S.: Rough and Fuzzy Sets for Dimensionality Reduction. In: Proceedings of the 11th Int. Conf. on Fuzzy Systems, pp. 29–34 (2002)

    Google Scholar 

  7. Zdzilaw, P.: Rough Sets Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Dordrecht (1991)

    Google Scholar 

  8. Ron, K., Brian, F.: Useful Feature Subsets and Rough Set Reducts. In: The International Workshop on Rough Sets and Soft Computing, pp. 310–317 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bae, IH., Lee, HJ., Lee, KS. (2006). Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11892960_59

Download citation

  • DOI: https://doi.org/10.1007/11892960_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46535-5

  • Online ISBN: 978-3-540-46536-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics