2021
DOI: 10.14569/ijacsa.2021.0120566
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System

Abstract: Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient models that offer high detection accuracy. Nevertheless, the challenge remains in developing reliable and efficient Intrusion Detection System (IDS) that is capable of handling large amounts of data, with trends evolving in real-time circumstances. The design of such a system relies on the detection methods used, particularly the feature selection techniques and machine learning algorithms used. Thus motivated, thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 105 publications
(83 reference statements)
0
17
0
1
Order By: Relevance
“…Feature selection is considered one of the main parts of IDS because these systems have to deal with a large amount of data so a strong feature reduction technique is always encouraged to be applied with the network classification problem. Researchers [34,[36][37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52] have used different feature selection techniques. The gain ratio, Pearson correlation, and ANOVA are few of the techniques that are widely used.…”
Section: Related Workmentioning
confidence: 99%
“…Feature selection is considered one of the main parts of IDS because these systems have to deal with a large amount of data so a strong feature reduction technique is always encouraged to be applied with the network classification problem. Researchers [34,[36][37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52] have used different feature selection techniques. The gain ratio, Pearson correlation, and ANOVA are few of the techniques that are widely used.…”
Section: Related Workmentioning
confidence: 99%
“…Ini lebih efisien dalam memperkenalkan pola paket, tetapi untuk mendeteksi bentuk ancaman dan varian baru, pertama-tama harus diperkenalkan ke system (Moustafa & Slay, 2016). Deteksi Anomali Teknik pendeteksian ini lebih berfokus pada trafik jaringan (Torabi et al, 2021). Keuntungan dari teknik ini adalah lebih cepat untuk mengetahui serangan baru tetapi tidak memberikan informasi yang jelas tentang dampak dari serangan tersebut.…”
Section: Pemantauanunclassified
“…IDS can be classified into four categories depending on the detection method, where detection systems may depend on signature, anomaly, specification, or hybrid detection methods [7]. In the first category, detecting an abnormal behaviour is achieved by using well-known patterns (signatures) for the previous threats in the database [8].…”
Section: Introductionmentioning
confidence: 99%
“…In the first category, detecting an abnormal behaviour is achieved by using well-known patterns (signatures) for the previous threats in the database [8]. When it comes to well-known, popular threats, this category provides better performance and very strong outcomes, but it is unable to identify the new unseen attacks or the zero-day attacks [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation