2021
DOI: 10.3390/sym13101764
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach

Abstract: The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big data powered by the Internet, and its highly valued real-world applications consisting of symmetric and asymmetric data distributions, has significantly changed our lives in many positive aspects. However, it equally comes with the current catastrophic daily escalating cyberattacks. Thus, raising the need for researchers to harness the innovative strengths of machine learning to design and implement intrusion de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 54 publications
(39 citation statements)
references
References 81 publications
1
30
0
Order By: Relevance
“…For example, it evaluates how well the SARG can efficiently generate standard and reliable Snort rules by executing SARG against live attacks in existing pcap files. Finally, this section will also highlight the results and performance evaluation of the (SEC) model that significantly mitigates the challenges of the vast alerts generated by the Snort IDS and the earlier proposed feature selection and ensemble-based IDS ( Jaw & Wang, 2021 ).…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, it evaluates how well the SARG can efficiently generate standard and reliable Snort rules by executing SARG against live attacks in existing pcap files. Finally, this section will also highlight the results and performance evaluation of the (SEC) model that significantly mitigates the challenges of the vast alerts generated by the Snort IDS and the earlier proposed feature selection and ensemble-based IDS ( Jaw & Wang, 2021 ).…”
Section: Resultsmentioning
confidence: 99%
“…(ii) Investigate the apparent relationship of COTIME and correlated alerts and present solutions to how we can correlate a larger sample size of alerts within an acceptable time frame to mitigate the need for unceasing computing resources. (iii) Finally, evaluate SEC within a live network environment instead of pcap files and auto-generate reliable and efficient Snort rules using the knowledge of the proposed anomaly IDS ( Jaw & Wang, 2021 ).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, the other types-based accuracy performances were also low, supporting this prediction. Jaw et al 36 designed an ensemble classifier (K-means, OneClass SVM, and Expectation-Maximization) and classified the UNSWNB-15 dataset into multiple classes. They used the genetic algorithm for the proposed approach and achieved an overall accuracy of 99.99%.…”
Section: Discussionmentioning
confidence: 99%
“…However, these valuable data are generally localized in practical applications and divided into asymmetric and symmetric data distributions. Examples include symmetrical relationships between data from extra-vehicular networks and asymmetrical probability distributions of malicious and normal network traffic [10]. Hence, the information security problem has always been one of the important factors of ICV that should be considered [2,11].…”
Section: Introductionmentioning
confidence: 99%