Flower Pollination Algorithm for feature analysis of Kyoto 2006+ data set

作者: Amrit Pal Singh , Arvinder Kaur

DOI: 10.1080/02522667.2019.1580886

关键词: Feature selectionData setPollinationIntrusion detection systemNetwork classificationAlgorithmComputer science

摘要: … In this section, Kyoto 2006+ data set of Network IDS are described with its attribute information. This study focuses on fourteen classical attributes and one label attribute. [12] gives the …

参考文章(18)
Asim Karim, Computational Intelligence for Network Intrusion Detection: Recent Contributions Computational Intelligence and Security. pp. 170- 175 ,(2005) , 10.1007/11596448_25
Bing Xue, Mengjie Zhang, Will N. Browne, Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach IEEE Transactions on Systems, Man, and Cybernetics. ,vol. 43, pp. 1656- 1671 ,(2013) , 10.1109/TSMCB.2012.2227469
G.V. Nadiammai, M. Hemalatha, Effective approach toward Intrusion Detection System using data mining techniques Egyptian Informatics Journal. ,vol. 15, pp. 37- 50 ,(2014) , 10.1016/J.EIJ.2013.10.003
Saurabh Mukherjee, Neelam Sharma, INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION Procedia Technology. ,vol. 4, pp. 119- 128 ,(2012) , 10.1016/J.PROTCY.2012.05.017
Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han, None, D-SCIDS: distributed soft computing intrusion detection system Journal of Network and Computer Applications. ,vol. 30, pp. 81- 98 ,(2007) , 10.1016/J.JNCA.2005.06.001
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten, The WEKA data mining software ACM SIGKDD Explorations Newsletter. ,vol. 11, pp. 10- 18 ,(2009) , 10.1145/1656274.1656278
Shelly Xiaonan Wu, Wolfgang Banzhaf, The use of computational intelligence in intrusion detection systems: A review Applied Soft Computing. ,vol. 10, pp. 1- 35 ,(2010) , 10.1016/J.ASOC.2009.06.019
Wei Pan, Weihua Li, A hybrid neural network approach to the classification of novel attacks for intrusion detection international symposium on parallel and distributed processing and applications. pp. 564- 575 ,(2005) , 10.1007/11576235_58
Preeti Aggarwal, Sudhir Kumar Sharma, Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection Procedia Computer Science. ,vol. 57, pp. 842- 851 ,(2015) , 10.1016/J.PROCS.2015.07.490
Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan, Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm IEEE Transactions on Computers. ,vol. 65, pp. 2986- 2998 ,(2016) , 10.1109/TC.2016.2519914