메뉴 건너뛰기




Volumn , Issue , 2012, Pages 296-301

Using feature selection for intrusion detection system

Author keywords

Anomaly base detection; Feature selection; Intrusion detection; security

Indexed keywords

CLASSIFICATION RESULTS; DENIAL OF SERVICE; INFORMATION GAIN; INTRUSION DETECTION SYSTEMS; SECURITY; STATE-OF-ART METHODS; TRAINING AND TESTING; TRAINING FUNCTION;

EID: 84872150200     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCIT.2012.6380910     Document Type: Conference Paper
Times cited : (109)

References (23)
  • 2
    • 84872137204 scopus 로고    scopus 로고
    • Application of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection
    • M. Sheikhan, et al., "Application of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection," Majlesi Journal of Electrical Engineering, vol. 5, 2011.
    • (2011) Majlesi Journal of Electrical Engineering , vol.5
    • Sheikhan, M.1
  • 3
    • 61849175333 scopus 로고    scopus 로고
    • Efficient deterministic method for detecting new U2R attacks
    • R. Beghdad, "Efficient deterministic method for detecting new U2R attacks," Computer Communications, vol. 32, pp. 1104-1110, 2009.
    • (2009) Computer Communications , vol.32 , pp. 1104-1110
    • Beghdad, R.1
  • 7
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • C. F. Tsai, et al., "Intrusion detection by machine learning: A review," Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
    • (2009) Expert Systems with Applications , vol.36 , pp. 11994-12000
    • Tsai, C.F.1
  • 9
    • 79151484606 scopus 로고    scopus 로고
    • Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
    • V. Bolón-Canedo, et al., "Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset," Expert Systems with Applications, vol. 38, pp. 5947-5957, 2011.
    • (2011) Expert Systems with Applications , vol.38 , pp. 5947-5957
    • Bolón-Canedo, V.1
  • 11
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • S. Chebrolu, et al., "Feature deduction and ensemble design of intrusion detection systems," Computers & Security, vol. 24, pp. 295-307, 2005.
    • (2005) Computers & Security , vol.24 , pp. 295-307
    • Chebrolu, S.1
  • 12
    • 84855369803 scopus 로고    scopus 로고
    • Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification
    • H. F. Eid, et al., "Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification," Security Technology, pp. 195-203, 2011.
    • (2011) Security Technology , pp. 195-203
    • Eid, H.F.1
  • 15
    • 84872167049 scopus 로고    scopus 로고
    • Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks
    • M. Sheikhan, et al., "Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks," World Applied Sciences Journal, vol. 8, pp. 302-308, 2010.
    • (2010) World Applied Sciences Journal , vol.8 , pp. 302-308
    • Sheikhan, M.1
  • 17
    • 76749092270 scopus 로고    scopus 로고
    • The WEKA data mining software: An update
    • M. Hall, et al., "The WEKA data mining software: an update," ACM SIGKDD Explorations Newsletter, vol. 11, pp. 10-18, 2009.
    • (2009) ACM SIGKDD Explorations Newsletter , vol.11 , pp. 10-18
    • Hall, M.1
  • 18
    • 0001880210 scopus 로고    scopus 로고
    • KDD-Cup 2000 organizers' report: Peeling the onion
    • R. Kohavi, et al., "KDD-Cup 2000 organizers' report: peeling the onion," ACM SIGKDD Explorations Newsletter, vol. 2, pp. 86-93, 2000.
    • (2000) ACM SIGKDD Explorations Newsletter , vol.2 , pp. 86-93
    • Kohavi, R.1
  • 19
    • 1642354876 scopus 로고    scopus 로고
    • KDD-99 Classifier Learning Contest: LLSoft's Results Overview
    • I. Levin, "KDD-99 Classifier Learning Contest: LLSoft's Results Overview," SIGKDD explorations, vol. 1, pp. 67-75, 2000.
    • (2000) SIGKDD Explorations , vol.1 , pp. 67-75
    • Levin, I.1
  • 20
    • 34447639073 scopus 로고    scopus 로고
    • A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
    • A. N. Toosi and M. Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers," Computer Communications, vol. 30, pp. 2201-2212, 2007.
    • (2007) Computer Communications , vol.30 , pp. 2201-2212
    • Toosi, A.N.1    Kahani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.