2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications 2014
DOI: 10.1109/trustcom.2014.15
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Abstract: Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks are usually of very huge in size. This creates a major challenge to IDSs, which need to examine all features in the data to identify intrusive patterns. The objective of this study is to analyze and select the more discriminate input features for building computation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(24 citation statements)
references
References 27 publications
0
22
0
2
Order By: Relevance
“…This helps the wrapper method (the lower phase) to decrease the searching range from the entire original feature space to the pre-selected features (the output of the upper phase). In this paper, we extend our work discussed in [10]. The key contributions of this paper are listed as follows.…”
Section: Introductionmentioning
confidence: 80%
See 1 more Smart Citation
“…This helps the wrapper method (the lower phase) to decrease the searching range from the entire original feature space to the pre-selected features (the output of the upper phase). In this paper, we extend our work discussed in [10]. The key contributions of this paper are listed as follows.…”
Section: Introductionmentioning
confidence: 80%
“…To address the aforementioned problems on the methods for feature selection, we have proposed a hybrid feature selection algorithm (HFSA) in [10]. HFSA consists of two phases.…”
Section: Introductionmentioning
confidence: 99%
“…Another filter ranking was implemented by Ambusaidi et al (2014), who proposed hybrid feature selection by combining both mutual information (filter ranking) and wrapper that using least square-SVM as classification algorithm in removing irrelevant and redundant features. Mutual information provides a good measurement to find relevant feature by quantify the amount of information to the output class.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, achieving low false detection and high attack recognition capabilities is still a major challenge. There are three main differences in our approaches compared to existing hybrid selection (Ambusaidi et al, 2014;Singh and Tiwari, 2015). The first approach uses correlation-based selection to determine the worthiness of each feature by removes redundant features that exist inside filter rank.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to efficiency, the validity is also an important measure of feature fusion techniques. For the KDD dataset series, SA-SVM [20], GA-LR [16], (Filter-MISF, FMIFS) [17], PCA [11], MIFS [24], (FRM-SFM, GFR) [18], SVM [9,10,19], (GeFS-mRMR, GeFS-CFS) [19], and NN [9] achieved very high accuracy, exceeding 99.20%, and the highest was 99.96% of SA-SVM. In addition, the FPR of Filter-MISF, GA-LR, Filter, MIFS, MLCFS [24], and SVM are less than 0.50%.…”
Section: Comparison Of Feature Fusion Techniquesmentioning
confidence: 99%