Feature Selection Using Relative Fuzzy Entropy and Ant Colony Optimization Applied to Real-time Intrusion Detection System

作者: and S. Srinivas Kumar Varma , Ravi Kiran , P. , V. Valli Kumari

DOI: 10.1016/J.PROCS.2016.05.203

关键词:

摘要: Abstract Intrusion Detection System (IDS) is one of the most important component network defense mechanism. In an attempt to detect attacks, traffic features need be identified and both attack normal data profiled. This paper proposes a set that can extracted for Real-Time Detection. also Fuzzy Entropy based heuristic Ant Colony Optimization (ACO) in-order search global best smallest Data set. The proposed feature reduction algorithm was tested on standard bench-mark UCI sets, found efficient. Further applied IDS produce promising results.

参考文章(17)
Jonathan J. Davis, Andrew J. Clark, Data preprocessing for anomaly based network intrusion detection: A review Computers & Security. ,vol. 30, pp. 353- 375 ,(2011) , 10.1016/J.COSE.2011.05.008
Richard Jensen, Qiang Shen, Fuzzy-rough data reduction with ant colony optimization Fuzzy Sets and Systems. ,vol. 149, pp. 5- 20 ,(2005) , 10.1016/J.FSS.2004.07.014
Pramod Kumar, Prahlad Vadakkepat, Loh Ai Poh, None, Fuzzy-rough discriminative feature selection and classification algorithm, with application to microarray and image datasets soft computing. ,vol. 11, pp. 3429- 3440 ,(2011) , 10.1016/J.ASOC.2011.01.013
Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Practical real-time intrusion detection using machine learning approaches Computer Communications. ,vol. 34, pp. 2227- 2235 ,(2011) , 10.1016/J.COMCOM.2011.07.001
CE Shennon, Warren Weaver, A mathematical theory of communication Bell System Technical Journal. ,vol. 27, pp. 379- 423 ,(1948) , 10.1002/J.1538-7305.1948.TB01338.X
John McHugh, Alan Christie, Julia Allen, Defending Yourself: The Role of Intrusion Detection Systems IEEE Software. ,vol. 17, pp. 42- 51 ,(2000) , 10.1109/52.877859
Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin, A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach Computers & Security. ,vol. 28, pp. 301- 309 ,(2009) , 10.1016/J.COSE.2008.12.001
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914