2018 IEEE 4th International Symposium on Wireless Systems Within the International Conferences on Intelligent Data Acquisition 2018
DOI: 10.1109/idaacs-sws.2018.8525522
|View full text |Cite
|
Sign up to set email alerts
|

A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(18 citation statements)
references
References 6 publications
1
17
0
Order By: Relevance
“…After obtaining the weights of each criterion as shown in Table 13, the second phases rank alternative data using the TOPSIS method. The initial steps of the TOPSIS method create the alternative data normalization matrix using (18) and create the Weighted Alternative Data Normalization Matrix using (19). The results of the Weighted Alternative Data Normalization Matrix are used to calculate the values of Positive Ideal Solutions Matrix and Negative Ideal Solutions Matrix using (20) as shown in Table 14.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…After obtaining the weights of each criterion as shown in Table 13, the second phases rank alternative data using the TOPSIS method. The initial steps of the TOPSIS method create the alternative data normalization matrix using (18) and create the Weighted Alternative Data Normalization Matrix using (19). The results of the Weighted Alternative Data Normalization Matrix are used to calculate the values of Positive Ideal Solutions Matrix and Negative Ideal Solutions Matrix using (20) as shown in Table 14.…”
Section: Resultsmentioning
confidence: 99%
“…K-Nearest Neighbor is a supervised algorithm learning based on the k-nearest neighbor by classifying new instances based on the majority of the k-nearest neighbor categories [18]. This method calculates similarities between samples of unlabeled data and all training data samples [19]. KNN is determined by looking at the shortest distance from the query instance to the training sample data.…”
Section: Classification Processmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method is able to identify features that can improve the accuracy of attack detection. Chen et al [25] introduce a tree-seed algorithm (TSA) that is used to extract effective features. The proposed algorithm reduces the dimension of data, by eliminating redundant features, which in turn improve the accuracy of the K-Nearest Neighbor (KNN) classifier.…”
Section: Relevant Researchesmentioning
confidence: 99%
“…In recent years, machine learning has been widely used to identify various types of network attacks in NIDS, thereby helping administrators take appropriate measures to prevent network intrusions. However, most traditional machine learning methods are shallow learning techniques, such as KNN (k-Nearest Neighbor) [4], SVM (Support Vector Machine) [5], SOM (Self-Organizing Map) [6] and so on. There are many problems in shallow learning methods, including a heavy dependence on feature engineering and feature selection, poor ability to detect unknown network attacks and high false alarm rates.…”
Section: Introductionmentioning
confidence: 99%