Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering 2020
DOI: 10.1145/3424311.3424330
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…According to the authors of [78], the most commonly used evaluation metrics for the current intrusion detection models are Accuracy (ACC), Detection rate (DR), and FAR. However, the authors in [79] claimed that DR is the most crucial metric for IDS performance evaluation.…”
Section: Adopted Model Evaluation Metricsmentioning
confidence: 99%
“…According to the authors of [78], the most commonly used evaluation metrics for the current intrusion detection models are Accuracy (ACC), Detection rate (DR), and FAR. However, the authors in [79] claimed that DR is the most crucial metric for IDS performance evaluation.…”
Section: Adopted Model Evaluation Metricsmentioning
confidence: 99%
“…Contaminated Features in Final Selection NSL-KDD [17] 2012 src bytes, service (metadata), dst bytes, dst host srv count, dst host same srv rate [18] 2015 src bytes, dst bytes, logged in, srv rerror rate [19] 2016 service, flag, src bytes, dst bytes [20] 2019 service, flag, src bytes, logged in [21] 2020 service, src bytes, flag [22] 2020 flag, logged in, service, dst host same srv rate, srv rerror rate, dst host srv count UNSW-NB-15 [18] 2015 state, dttl, sttl, ct state tll, ct srv dst, ct dst sport ltm [23] 2019 dttl [24] 2019 sttl, ct dst src ltm [25] 2020 dttl, ct srv src, ct dst sport ltm, ct dst src ltm, ct srv dst [26] 2022 sttl, ct state ttl, dsport (metadata)…”
Section: Yearmentioning
confidence: 99%
“…Feature selection is widely used in many domains: intrusion detection, 25,26 genomic analysis, 27,28 text categorization, 29 and bioinformatics, 30 among others. As this work is an extension of our previous work, 31 a thorough review of the application of feature selection in intrusion detection can be found in the previous work. In this study, emphasis is given on the effectiveness and efficiency of the proposed feature selection approach in comparison to various feature selection methods.…”
Section: Feature Selectionmentioning
confidence: 99%
“…The embedded approach achieves model fitting and feature selection simultaneously, performing the feature selection during the learning time. 18 In this article, which is an extension of our previous work, 19 three more filter methods in addition to the wrapper method are compared. The wrapper-based feature selection with decision tree algorithm is first used as a regular means of obtaining an optimal subset of the original features.…”
Section: Introductionmentioning
confidence: 99%