메뉴 건너뛰기




Volumn 21, Issue 8, 2010, Pages 1143-1149

Impact of feature reduction on the efficiency of wireless intrusion detection systems

Author keywords

Feature selection; information gain ratio; intrusion detection systems; K means; neural networks; wireless networks

Indexed keywords

ANOMALY DETECTION MODELS; CURRENT SYSTEM; DOS ATTACKS; EXPERIMENTAL SECTION; FEATURE REDUCTION; FEATURE SELECTION; FEATURE SETS; HYBRID MODEL; INFORMATION GAIN RATIO; INTRUSION DETECTION MODELS; INTRUSION DETECTION SYSTEMS; K-MEANS; LEARNING TIME; MAC LAYER; NETWORK ATTACK; NETWORK RESOURCE; OPTIMAL SETS; REMOVE NOISE; SIGNIFICANT IMPACTS; TCP/IP HEADERS; TRAINING AND TESTING; TRANSPORT LAYERS; WIRELESS INTRUSION;

EID: 77954310491     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.142     Document Type: Article
Times cited : (59)

References (26)
  • 1
    • 34548453089 scopus 로고    scopus 로고
    • An agent based and biological inspired real- Time intrusion detection and security model for computer network operations
    • Sept.
    • A. Boukerche, R.B. Machado, K.R.L. Jucá , J.B.M. Sobral, and M.S.M.A. Notare, "An Agent Based and Biological Inspired Real- Time Intrusion Detection and Security Model for Computer Network Operations," Computer Comm., vol.30, no.13, pp. 2649- 2660, Sept. 2007.
    • (2007) Computer Comm. , vol.30 , Issue.13 , pp. 2649-2660
    • Boukerche, A.1    MacHado, R.B.2    Jucá, K.R.L.3    Sobral, J.B.M.4    Notare, M.S.M.A.5
  • 2
    • 2642537707 scopus 로고    scopus 로고
    • An artificial immune based intrusion detection model for computer and telecommunication systems
    • A. Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, "An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems," Parallel Computing, vol.30, nos. 5/6, pp. 629-646, 2004.
    • (2004) Parallel Computing , vol.30 , Issue.5-6 , pp. 629-646
    • Boukerche, A.1    Juc, K.R.L.2    Sobral, J.B.3    Notare, M.S.M.A.4
  • 3
    • 0036749185 scopus 로고    scopus 로고
    • Behavior-based intrusion detection in mobile phone systems
    • A. Boukerche and M.S.M.A. Notare, "Behavior-Based Intrusion Detection in Mobile Phone Systems," J. Parallel and Distributed Computing, vol.62, no.9, pp. 1476-1490, 2002.
    • (2002) J. Parallel and Distributed Computing , vol.62 , Issue.9 , pp. 1476-1490
    • Boukerche, A.1    Notare, M.S.M.A.2
  • 6
    • 77954309409 scopus 로고    scopus 로고
    • http://kdd.ics.uci.edu/databases/kddcup99/task.html, 2010.
    • (2010)
  • 8
    • 84943383590 scopus 로고    scopus 로고
    • Identifying important features for intrusion detection using support vector machines and neural networks
    • Jan.
    • A.H. Sung and S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks," Proc. Symp. Applications and the Internet (SAINT '03), Jan. 2003.
    • (2003) Proc. Symp. Applications and the Internet (SAINT '03)
    • Sung, A.H.1    Mukkamala, S.2
  • 11
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-service attacks: Real Vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. USENIX Security Symp., pp. 15-28, 2003.
    • (2003) Proc. USENIX Security Symp. , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 12
    • 77954313420 scopus 로고    scopus 로고
    • http://www.aircrack-ng.org/, 2010.
    • (2010)
  • 18
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J.R. Quinlan, "Induction of Decision Trees," Machine Learning, vol.1, pp. 81-106, 1986.
    • (1986) Machine Learning , vol.1 , pp. 81-106
    • Quinlan, J.R.1
  • 20
    • 77954313325 scopus 로고    scopus 로고
    • NeuroSolutions, Inc., http://www.neurosolutions.com/, 2010.
    • (2010)
  • 21
    • 77954313705 scopus 로고    scopus 로고
    • CERT, http://www.cert.org/stats/, 2010.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.