2014
DOI: 10.14445/22315381/ijett-v9p296
|View full text |Cite
|
Sign up to set email alerts
|

Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

Abstract: Abstract-Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion detection system (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect anomalies. However with the huge amount of network traffic, collected data contains irrelevant and redundant features that affect the detection rate of the IDS, consumes high amount of sy… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 62 publications
0
9
0
1
Order By: Relevance
“…Selain itu, terlalu banyak fitur yang tidak relevan akan menghasilkan kategori kelas yang tidak berhubungan [9]. Mengacu pada penelitian [10]& [11]disebutkan bahwa seleksi fitur dapat meningkatkan akurasi algorithma klasifikasi. Oleh karenanya penelitian ini bertujuan meningkatkan performa deteksi serangan DDoS dengan menggunakan teknik seleksi fitur.…”
Section: Pendahuluanunclassified
“…Selain itu, terlalu banyak fitur yang tidak relevan akan menghasilkan kategori kelas yang tidak berhubungan [9]. Mengacu pada penelitian [10]& [11]disebutkan bahwa seleksi fitur dapat meningkatkan akurasi algorithma klasifikasi. Oleh karenanya penelitian ini bertujuan meningkatkan performa deteksi serangan DDoS dengan menggunakan teknik seleksi fitur.…”
Section: Pendahuluanunclassified
“…While intrusion detection remains a popular research domain, less attention has been placed upon the identification of detection sensor placement within a network. Work in [10] explored the use of Bayesian networks to identify sensor placement in a network, while in [11] the authors propose feature selection techniques necessary for IDS [12]. To complement this, researchers have also explored models to analyze and detect the propagation of attacks through a network.…”
Section: Related Workmentioning
confidence: 99%
“…Relevant Feature Selection Model Using Data Mining for Intrusion Detection System [11]: To build a lightweight intrusion detection system, a relevant feature selection model was developed to select the best features set which uses seven different feature evaluation methods to select and rank relevant features. This model has four different stages, Data Pre-Processing, Best Classifier Selection, Feature Reduction, and Best Features Selection.…”
Section: Comparison Of the Kdd99 And Unsw-nb15 Data Setmentioning
confidence: 99%