Improving signature detection classification model using features selection based on customized features

作者: Zulaiha Ali Othman , Azuraliza Abu Bakar , Intesar Etubal

DOI: 10.1109/ISDA.2010.5687051

关键词: Feature extractionComputer scienceConstant false alarm ratePattern recognitionData modelingFalse alarmArtificial intelligenceHidden Markov modelDecision treeData pre-processingData miningIntrusion detection system

摘要: … model by applying the features extraction based customized features. The customized … the signature model by performing the GA selection features based on customized features. The …

参考文章(14)
Noelia Sánchez-Maroño, Beatriz Pérez-Sánchez, Amparo Alonso-Betanzos, Juan A. Suárez-Romero, Félix M. Carballal-Fortes, Classification of computer intrusions using functional networks. A comparative study. the european symposium on artificial neural networks. pp. 579- 584 ,(2007)
Pedro A. Diaz-Gomez, Dean F. Hougen, IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM international conference on enterprise information systems. pp. 66- 73 ,(2016)
Andrew H. Sung, Srinivas Mukkamala, The feature selection and intrusion detection problems Lecture Notes in Computer Science. pp. 468- 482 ,(2004) , 10.1007/978-3-540-30502-6_34
Lian-hua Zhang, Guan-hua Zhang, Lang Yu, Jie Zhang, Ying-cai Bai, Intrusion detection using rough set classification Journal of Zhejiang University Science. ,vol. 5, pp. 1076- 1086 ,(2004) , 10.1631/JZUS.2004.1076
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Feature Selection Using Rough Set in Intrusion Detection ieee region 10 conference. pp. 1- 4 ,(2006) , 10.1109/TENCON.2006.344210
Huy Anh Nguyen, Deokjai Choi, Application of Data Mining to Network Intrusion Detection: Classifier Selection Model asia pacific network operations and management symposium. pp. 399- 408 ,(2008) , 10.1007/978-3-540-88623-5_41
Srilatha Chebrolu, Ajith Abraham, Johnson P Thomas, None, Feature deduction and ensemble design of intrusion detection systems Computers & Security. ,vol. 24, pp. 295- 307 ,(2005) , 10.1016/J.COSE.2004.09.008
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks symposium on applications and the internet. pp. 209- 216 ,(2003) , 10.1109/SAINT.2003.1183050
Micheline Kamber, Jiawei Han, Jian Pei, Data Mining: Concepts and Techniques ,(2000)