2013
DOI: 10.1016/j.neucom.2012.12.023
|View full text |Cite
|
Sign up to set email alerts
|

Designing of on line intrusion detection system using rough set theory and Q-learning algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…From Table 2, it is observed that, even though each filter uses different ranking techniques, some features are common across different filter methods. Using simple majority vote, features 4,29,34,12,39,3,5,6,30,33,38,25, and 23 (indicated in bold) appeared across more than three filter methods; this shows the level of importance these features are to the output class (see Table 3). Table 3 shows the 13 selected features out of the onethird split of the most important features of NSL-KDD dataset using EMFFS method.…”
Section: Pre-processing Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…From Table 2, it is observed that, even though each filter uses different ranking techniques, some features are common across different filter methods. Using simple majority vote, features 4,29,34,12,39,3,5,6,30,33,38,25, and 23 (indicated in bold) appeared across more than three filter methods; this shows the level of importance these features are to the output class (see Table 3). Table 3 shows the 13 selected features out of the onethird split of the most important features of NSL-KDD dataset using EMFFS method.…”
Section: Pre-processing Datasetmentioning
confidence: 99%
“…Olusola et al [28] proposed a rough set-based feature selection method that selects important features from an input data using KDD '99 dataset. Sengupta et al [29] designed an online intrusion detection system (IDS) using both rough set theory and Q-learning algorithm to achieve a maximum classification algorithm that classifies data as either normal or anomaly using NSL-KDD network traffic data. A fast attribute reduction algorithm based on rough set theory was proposed in [30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the paper [12], a wide-ranging method has been proposed in developing IDS where RST and Q-learning algorithm are included to provide accommodation real time traffic data for sensing impositions with maximum classification correctness. Rough set theory is applied on discrete data only and so in the effort cut is applied on restricted attributes for discretization.…”
Section: Literature Surveymentioning
confidence: 99%
“…1 An IDS is a security tool that monitors all activity on a network and detects any attempts which may destroy confidentiality, integrity or availability of computer networks or systems. 2,3 To have an efficient and effective IDS, patterns of previously observed activity are usually analyzed to determine normal traffic or attack specifications. Such specifications can be used in newly observed patterns for intrusion detection.…”
Section: Introductionmentioning
confidence: 99%