2012 Third International Conference on Emerging Intelligent Data and Web Technologies 2012
DOI: 10.1109/eidwt.2012.10
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection in the Corrected KDD-dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…In signature based NIDS, a database of existing known attack signatures is compared with the current system activities in order to alert the network administrators [9]. On the contrary, anomaly based NIDS, deals with detecting of unknown attacks in network traffics [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In signature based NIDS, a database of existing known attack signatures is compared with the current system activities in order to alert the network administrators [9]. On the contrary, anomaly based NIDS, deals with detecting of unknown attacks in network traffics [10].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed method achieved 91% classification accuracy using only three input features and 99% classification accuracy using 36 input features, while 41 input features achieved 99% classification accuracy. It is important to mention that some of the researchers have been working on KDD'99 dataset samples rather than the complete training dataset due to the size of this dataset [10].…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [32] describe how intrusion detection systems categorise network traffic as either an anomaly or normal. Data mining is employed into an intrusion detection system as a method of extracting the huge volumes of data that exist in network traffic for further analysis [14].…”
Section: Data Miningmentioning
confidence: 99%
“…Zargari and Voorhis [32] examine significant features in anomaly detection systems with an aim to apply them to data mining techniques. Identifying some current challenges of obtaining a comprehensive feature set and establishing a system that eradicates redundant and recurring data from the KDD 99 dataset while also keeping the feature set to a minimal size.…”
Section: B Feature Selectionmentioning
confidence: 99%
“…Previously, they directly removed nominal features (i.e., protocol_type, service and flag) supposedly to enable linear analysis. Finally, two feature selection methods extracted from Weka (Correlation-Stepwise-based, and Information-Gainbased) are applied in Zargari and Voorhis (2012), reaching the best performance with a subset of 10 features.…”
Section: Related Workmentioning
confidence: 99%