Relevance Features Selection for Intrusion Detection

作者: Adetunmbi Adebayo Olusola , Oladele S Adeola , Oladuni Abosede Daramola , None

DOI: 10.1007/978-1-4614-0373-9_31

关键词:

摘要: The rapid development of business and other transaction systems over the Internet makes computer security a critical issue. In recent times, data mining machine learning have been subjected to extensive research in intrusion detection with emphasis on improving accuracy classifier. But selecting important features from input lead simplification problem, faster more accurate rates. this paper, we presented relevance each feature KDD’99 dataset class. Rough set degree dependency ratio class were employed determine most discriminating for Empirical results show that seven not relevant any

参考文章(14)
Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck, Learning intrusion detection: supervised or unsupervised? international conference on image analysis and processing. pp. 50- 57 ,(2005) , 10.1007/11553595_6
Sanjay Rawat, V. P. Gulati, Arun K. Pujari, A Fast Host-Based Intrusion Detection System Using Rough Set Theory Transactions on Rough Sets IV. ,vol. 4, pp. 144- 161 ,(2005) , 10.1007/11574798_8
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, Mining in a data-flow environment: experience in network intrusion detection knowledge discovery and data mining. pp. 114- 124 ,(1999) , 10.1145/312129.312212
Lian-hua Zhang, Guan-hua Zhang, Lang Yu, Jie Zhang, Ying-cai Bai, Intrusion detection using rough set classification Journal of Zhejiang University Science. ,vol. 5, pp. 1076- 1086 ,(2004) , 10.1631/JZUS.2004.1076
Stefan Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection computer and communications security. pp. 1- 7 ,(1999) , 10.1145/319709.319710
Tao Gu, D Pung, Hung Keng, Zhang, A service-oriented middleware for building context-aware services Journal of Network and Computer Applications. ,vol. 28, pp. 1- 18 ,(2005) , 10.1016/J.JNCA.2004.06.002
ByungRae Cha, KyungWoo Park, JaeHyun Seo, Neural network techniques for host anomaly intrusion detection using fixed pattern transformation international conference on computational science and its applications. pp. 254- 263 ,(2005) , 10.1007/11424826_27
S. Mukkamala, G. Janoski, A. Sung, Intrusion detection using neural networks and support vector machines international joint conference on neural network. ,vol. 2, pp. 1702- 1707 ,(2002) , 10.1109/IJCNN.2002.1007774
Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han, None, D-SCIDS: distributed soft computing intrusion detection system Journal of Network and Computer Applications. ,vol. 30, pp. 81- 98 ,(2007) , 10.1016/J.JNCA.2005.06.001
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks symposium on applications and the internet. pp. 209- 216 ,(2003) , 10.1109/SAINT.2003.1183050