2013
DOI: 10.1186/1687-1499-2013-271
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile computing, e-commerce, telecommunication, and network management. In this paper, a survey on intelligent techniques for feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 154 publications
(88 citation statements)
references
References 57 publications
(58 reference statements)
0
88
0
Order By: Relevance
“…An innovative algorithm for feature selection by using tuple selection and attribute selection was proposed by Sannasi Ganapathy et.al in [7]. Information gain ratio and rules were used for attribute selection.…”
Section: Related Workmentioning
confidence: 99%
“…An innovative algorithm for feature selection by using tuple selection and attribute selection was proposed by Sannasi Ganapathy et.al in [7]. Information gain ratio and rules were used for attribute selection.…”
Section: Related Workmentioning
confidence: 99%
“…Ganapathy et al [31] review current feature selection and classification techniques for IDS, surveying intelligent techniques for developing IDSs then developing a new IDS using two proposed algorithms. Once an understanding was developed, a test scenario was formulated whereby a subset of KDD consisting of 10% of its records was used to test the algorithms.…”
Section: B Feature Selectionmentioning
confidence: 99%
“…For feature selection, gradually feature removal method, modified mutual information-based feature selection algorithm, CRFbased feature selection, and wrapper based genetic feature selection methods have been compared. Regarding to classification techniques, [9] compares neural networks, genetic algorithms, fuzzy sets, rough sets, Neuro-Fuzzy, fuzzygenetic algorithms and particle swarm optimization. They did not give any statistics that compare reviewed methods in their review.…”
Section: Related Reviews About Kdd99 and Intrusion Detectionmentioning
confidence: 99%
“…Recent reviews [5,10] also identify this problem as a research gap. Therefore, KDD99 is the most used dataset in IDS domain [9,14,23].…”
mentioning
confidence: 99%