2020
DOI: 10.3390/electronics9081206
|View full text |Cite
|
Sign up to set email alerts
|

A Combination Strategy of Feature Selection Based on an Integrated Optimization Algorithm and Weighted K-Nearest Neighbor to Improve the Performance of Network Intrusion Detection

Abstract: With the widespread use of the Internet, network security issues have attracted more and more attention, and network intrusion detection has become one of the main security technologies. As for network intrusion detection, the original data source always has a high dimension and a large amount of data, which greatly influence the efficiency and the accuracy. Thus, both feature selection and the classifier then play a significant role in raising the performance of network intrusion detection. This paper takes t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 46 publications
0
15
0
Order By: Relevance
“…2, April 2022: 1869-1880 1872 [22]. PSO is a common swarm intelligence algorithm employed in the continuous search space to solve global optimization [23], [24].…”
Section: Particle Swarm Optimization (Pso)mentioning
confidence: 99%
See 1 more Smart Citation
“…2, April 2022: 1869-1880 1872 [22]. PSO is a common swarm intelligence algorithm employed in the continuous search space to solve global optimization [23], [24].…”
Section: Particle Swarm Optimization (Pso)mentioning
confidence: 99%
“…The KNN is a lazy learning algorithm aimed at classifying a new object based on the current classes in which the previous training points are categorized. It categorizes the latest data points based on metrics of resemblance [24], [28].…”
Section: K-nearest Neighbor (Knn)mentioning
confidence: 99%
“…So, the earlier researchers used various approaches based on conventional ML for intrusion detection (ID). Xu et al [19] applied K-nearest neighbors (K-NN) for anomaly ID, and evaluated the efficacy of the proposed ID system using the KDDCup ID dataset. Bhati et al [20] applied variants of support vector machine (SVM), such as quadratic, linear, fine, and medium Gaussian, to analyze the performance of SVM techniques using the NSL-KDD dataset.…”
Section: Related Workmentioning
confidence: 99%
“…The K-Means [48][49][50] algorithm uses distance as the classification criterion. The smaller the distance between two samples, the more similar they are.…”
Section: Obtaining the Optimal Anchor Boxesmentioning
confidence: 99%