2012
DOI: 10.1002/sec.609
|View full text |Cite
|
Sign up to set email alerts
|

Using particle swarm optimization in fuzzy association rules‐based feature selection and fuzzy ARTMAP‐based attack recognition

Abstract: Feature selection is a classic research topic in data mining, and it has attracted much interest in many fields such as network security. In addition, data mining approaches such as fuzzy association rule mining (FARM) can improve the performance of intrusion detection systems. In this study, a FARM‐based feature selector is proposed in order to reduce the dimension of input features to the misuse detector. Furthermore, a fuzzy ARTMAP neural network is used as the classifier. The accuracy of the proposed appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 60 publications
(86 reference statements)
0
2
0
Order By: Relevance
“…Compared with the other evolutionary algorithms, PSO has the following strengths: ease of implementation, high‐quality solutions, computational efficiency and speed of convergence. It has been applied to solve optimization problems in many areas successfully . In a WSN, the issues such as node deployment, localization, energy‐efficient clustering, data fusion and topology control are often formulated as optimization problems, and PSO has been applied to address these WSN issues.…”
Section: System Modelmentioning
confidence: 99%
“…Compared with the other evolutionary algorithms, PSO has the following strengths: ease of implementation, high‐quality solutions, computational efficiency and speed of convergence. It has been applied to solve optimization problems in many areas successfully . In a WSN, the issues such as node deployment, localization, energy‐efficient clustering, data fusion and topology control are often formulated as optimization problems, and PSO has been applied to address these WSN issues.…”
Section: System Modelmentioning
confidence: 99%
“…Intrusion may affect the integrity, availability of the computer recourse. Intrusion may be external attacks or internal attacks [2]. The process of detecting and preventing intrusion activity is known as intrusion detection.…”
Section: Introductionmentioning
confidence: 99%