2011
DOI: 10.1007/978-3-642-27189-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 15 publications
0
11
0
2
Order By: Relevance
“…The authors improved their work by using information gain to rank the features and then a behaviorbased feature selection to reduce the feature set to 20. This resulted in an improvement in reported accuracy using the training dataset [12].…”
Section: Related Workmentioning
confidence: 99%
“…The authors improved their work by using information gain to rank the features and then a behaviorbased feature selection to reduce the feature set to 20. This resulted in an improvement in reported accuracy using the training dataset [12].…”
Section: Related Workmentioning
confidence: 99%
“…All of the aforementioned detection techniques were evaluated on the KDD Cup 99 dataset. However, due to some limitations in this dataset, which will be discussed in Subsection 5.1, some other detection methods [18], [19], [20], [21], [22], [23] were evaluated using other intrusion detection datasets, such as NSL-KDD [24] and Kyoto 2006+ [25]. A dimensionality reduction method proposed in [25] was to find the most important features involved in building a naive bayesian classifier for intrusion detection.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…La selección de atributos para mejorar el rendimiento de los métodos empleados para la detección de anomalías es una tarea ardua que ha sido llevada a cabo de diferentes maneras en el estado-del-arte. En [15] se propone un método para seleccionar rasgos basado en dos capas. La primera capa emplea Ganancia de Información para ordenar los atributos y generar un nuevo conjunto de atributos basándose en una medida global de precisión.…”
Section: Materiales Y Métodosunclassified
“…Los métodos de detección de anomalías basadas en aprendizaje automatizado han devenido en una herramienta útil debido a la capacidad de tratar con grandes cantidades de datos y a la capacidad de detectar ataques nunca antes vistos. De manera general en este campo de investigación se emplean métodos basados en naives Bayes [7], [8], [9], máquinas de vector soporte [10], [11], [12], basados en vecindad [13], [14], árboles de decisión [15], [16], esquemas de múltiples clasificadores [17], [18] y redes neuronales y aprendizaje profundo [19], [20], [21], [22], [23], entre otros [24], [25].…”
Section: Introductionunclassified