2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2017
DOI: 10.1109/iccic.2017.8524381
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Using Bayesian Network and Feature Subset Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Because this type of classifier is based on the probabilistic values of all attributes, low-level training samples with the Naïve-Bayes classifier do not deteriorate its accomplishment. The primary disadvantage of the Naïve-Bayes classifier is that all the attributes are considered being independent, even though in practice this barely takes place [18].…”
Section: Machine Learningmentioning
confidence: 99%
See 2 more Smart Citations
“…Because this type of classifier is based on the probabilistic values of all attributes, low-level training samples with the Naïve-Bayes classifier do not deteriorate its accomplishment. The primary disadvantage of the Naïve-Bayes classifier is that all the attributes are considered being independent, even though in practice this barely takes place [18].…”
Section: Machine Learningmentioning
confidence: 99%
“…Denial of Service: in this type of attack, the device memory is busy and full and in such a way that it cannot respond when it takes the request [18]. The best way to defend from this kind of attack is by turning the device off.…”
Section: Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…The new algorithm achieved a high detection rate of unknown attacks on the KDD cup dataset. An improved IDS based on a Bayesian network and feature selection algorithm was proposed in [29]. Although these ML detection algorithms achieved higher recognition accuracy in intrusion detection tasks, they not only need large-scale feature engineering but the model parameters are also difficult to adjust.…”
Section: Related Workmentioning
confidence: 99%
“…Their system focuses on event timing instead of complex features even though their HIDS data has somewhat imprecise timing which could allow incorrect event ordering. Jabbar et al (2017) focus on increasing the detection rate and accuracy while attenuating the number of false alarms in an IDS using feature selection in combination with a BN classifier. Our approach seeks to achieve these same goals via more sophisticated techniques for feature selection and discretization and generates a suite of BN classifiers with performance tradeoffs.…”
Section: Introductionmentioning
confidence: 99%