Firefly algorithm based feature selection for network intrusion detection

作者: Selvakumar B , Muneeswaran K

DOI: 10.1016/J.COSE.2018.11.005

关键词: Data miningFirefly algorithmIntrusionNetwork intrusion detectionFeature selectionClassifier (UML)Dimensionality reductionIntrusion detection systemComputer scienceBayesian network

摘要: … The IDS based on detection mechanism is categorized into misuse detection, anomaly detection and hybrid IDS. Misuse detection uses the predefined set of rules or signatures to …

参考文章(22)
C G Priya, P Uday Babu, R Visakh, Survey on Intrusion Detection Techniques Using Data-Mining Domain International journal of engineering research and technology. ,vol. 3, ,(2014)
Huan Liu, Lei Yu, Feature selection for high-dimensional data: a fast correlation-based filter solution international conference on machine learning. pp. 856- 863 ,(2003)
Xin-She Yang, Firefly Algorithm, Lévy Flights and Global Optimization Research and Development in Intelligent Systems XXVI. pp. 209- 218 ,(2010) , 10.1007/978-1-84882-983-1_15
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, Toward a more practical unsupervised anomaly detection system Information Sciences. ,vol. 231, pp. 4- 14 ,(2013) , 10.1016/J.INS.2011.08.011
Akhilesh Kumar Shrivas, Amit Kumar Dewangan, None, An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set International Journal of Computer Applications. ,vol. 99, pp. 8- 13 ,(2014) , 10.5120/17447-5392
Siva S. Sivatha Sindhu, S. Geetha, A. Kannan, Decision tree based light weight intrusion detection using a wrapper approach Expert Systems With Applications. ,vol. 39, pp. 129- 141 ,(2012) , 10.1016/J.ESWA.2011.06.013
Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, Constructing important features from massive network traffic for lightweight intrusion detection Iet Information Security. ,vol. 9, pp. 374- 379 ,(2015) , 10.1049/IET-IFS.2014.0353
Rung-Ching Chen, Kai-Fan Cheng, Ying-Hao Chen, Chia-Fen Hsieh, Using Rough Set and Support Vector Machine for Network Intrusion Detection System asian conference on intelligent information and database systems. pp. 465- 470 ,(2009) , 10.1109/ACIIDS.2009.59