2015
DOI: 10.1049/iet-ifs.2014.0353
|View full text |Cite
|
Sign up to set email alerts
|

Constructing important features from massive network traffic for lightweight intrusion detection

Abstract: International audienceEfficiently processing massive data is a big issue in high-speed network intrusion detection, as network traffic has become increasingly large and complex. In this work, instead of constructing a large number of features from massive network traffic, the authors aim to select the most important features and use them to detect intrusions in a fast and effective manner. The authors first employed several techniques, that is, information gain (IG), wrapper with Bayesian networks (BN) and Dec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…Given the presence of massive network traffic in the real world, it is prudent to consider large number of instances for experimentation as in the case of the UGR'16 dataset. With the advent of Internet of things (IOT), network traffic will only become more and more complex in the coming years [36,37].…”
Section: Resultsmentioning
confidence: 99%
“…Given the presence of massive network traffic in the real world, it is prudent to consider large number of instances for experimentation as in the case of the UGR'16 dataset. With the advent of Internet of things (IOT), network traffic will only become more and more complex in the coming years [36,37].…”
Section: Resultsmentioning
confidence: 99%
“…In [22][23][24][25][26][27][28], the authors have proposed a FS method based on limited criteria using the NSGA-II for network anomaly detection and pattern classification. They have evaluated their work in terms of classification accuracy and time of execution for different benchmark datasets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…With the intention of reducing computational costs and improving IDS classification performance, several machine learning techniques with Chi-square (CHI), Information gain (IG) [16] and Correlation-based Feature Selection (CFS) such as filter techniques [17] are used in this study. The filter technique based on the ranking approach sorts the features according to their usefulness in the classification movement.…”
Section: Introductionmentioning
confidence: 99%