2020
DOI: 10.1088/1742-6596/1471/1/012019
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Data Mining Algorithm: PSO-KNN, PSO-RF, and PSO-DT to Measure Attack Detection Accuracy Levels on Intrusion Detection System

Abstract: Nowadays, computer networks are widely used to exchange valuable and confidential data information between servers to computers or cellular devices. Access to user control and use of software or hardware as a firewall often experience security problems. Unauthorized access to information through computer networks continues to occur and tends to increase. This study examines the attack detection mechanism by using three data mining algorithms based on particle swarm optimization (PSO), namely PSO-K Nearest Neig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The major problem is the increase in exponentially the search space with features numbers in the data set [8]. k-nearest neighbor (kNN) [9] is among the most widely used methods in classification systems [10], [11], [12], [13]. Swarm intelligence (SI) algorithms can successfully solve several problems.…”
Section: Introductionmentioning
confidence: 99%
“…The major problem is the increase in exponentially the search space with features numbers in the data set [8]. k-nearest neighbor (kNN) [9] is among the most widely used methods in classification systems [10], [11], [12], [13]. Swarm intelligence (SI) algorithms can successfully solve several problems.…”
Section: Introductionmentioning
confidence: 99%
“…The dataset consists of 41 features and a label to specify either normal or attack (and type of attack). The training phase involves 41 features and 494023 instances whereas the testing phase involves 41 features and 148206 instances [31]. Table 1 shows the training and testing instances for the KDD-CUP 99 dataset employed in this study.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…The information includes feature sets and a label indicating whether it is an attack or a common attribute (and type of attack). In the learning phase, 41 characteristics and 494023 cases are utilised, whereas in the testing phase, 41 features and 148206 cases have been used [31]…”
Section: Dataset Descriptionmentioning
confidence: 99%