2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.387
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Feature Selection Method for Intrusion Detection System

Abstract: Abstract-This paper considers the feature selection problem for data classification in the absence of data labels. Due to the lack of categorized information in many practical applications, unsupervised feature selection has been proven to be more practically important but at the same time more difficult. It is not an easy task to assess the relevance of a feature or a subset of features when there are no labels available with the data. In this paper, we first propose an unsupervised feature selection algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Note that ring -3 based Nighthawk is installing on the same platform and does the same introspection work [11]. Thus, we install the Kernel- [8], Hypervisor- [65] and SMM-based defender [66], and use the mpstate to monitor each CPU utilization. Here we test the CPU consumption with and without installing defenders.…”
Section: ) Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that ring -3 based Nighthawk is installing on the same platform and does the same introspection work [11]. Thus, we install the Kernel- [8], Hypervisor- [65] and SMM-based defender [66], and use the mpstate to monitor each CPU utilization. Here we test the CPU consumption with and without installing defenders.…”
Section: ) Comparisonmentioning
confidence: 99%
“…To avoid such malicious remote services, users can either passively trust the platform, supported by security-enhanced workers [3]- [5], or actively seek to validate the remote service environment [6], [7]. To enhance cloud computing security, providers such as IBM and Huawei have proposed a series of security rules based on existing protection protectionmechanism-e.g., a network intrusion detection system (NIDS) [8] and distributed antivirus software [9]. However, such security mechanisms are deployed at the kernel level in the remote target system, which may already be compromised by untrusted platform providers.…”
Section: Introductionmentioning
confidence: 99%
“…The system has been evaluated on KDD Cup 99 and ISCX 2012 datasets and achieved promising detection accuracy of 99.95% and 90.12% respectively. However, current network traffic data, which are often huge in size, present a major challenge to IDSs [9]. These "big data" slow down the entire detection process and may lead to unsatisfactory classification accuracy due to the computational difficulties in handling such data.…”
Section: Introductionmentioning
confidence: 99%
“…Clustering-guided sparse structural learning (CGSSL) is proposed by integrating cluster analysis and sparse structural analysis into a joint framework and experimentally evaluated for the unsupervised feature selection problem [9]. M. A. Ambusaidi et al proposed an unsupervised feature selection algorithm, which is an enhancement over Laplacian score method [10].…”
Section: Introductionmentioning
confidence: 99%