A Feature Selection Algorithm towards Efficient Intrusion Detection
نویسندگان
چکیده
منابع مشابه
A Feature Selection Algorithm towards Efficient Intrusion Detection
Feature selection algorithm plays a crucial role in intrusion detection, data mining and pattern recognition. According to some evaluation criteria, it gets optimal feature subset by deleting unrelated and redundant features of the original data set. Aiming at solving the problems about the low accuracy, the high false positive rate and the long detection time of the existing feature selection ...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملFeature Selection Using a Genetic Algorithm for Intrusion Detection
We show the use of a genetic algorithm for feature subset selection over feature vectors that describe the system calls executed by privileged processes. Genetic feature subset selection significantly reduces the number of features used without adversely affecting the accuracy of the predictions.
متن کاملHybrid Feature Selection Algorithm for Intrusion Detection System
Network security is a serious global concern. Usefulness Intrusion Detection Systems (IDS) are increasing incredibly in Information Security research using Soft computing techniques. In the previous researches having irrelevant and redundant features are recognized causes of increasing the processing speed of evaluating the known intrusive patterns. In addition, an efficient feature selection m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Multimedia and Ubiquitous Engineering
سال: 2015
ISSN: 1975-0080,1975-0080
DOI: 10.14257/ijmue.2015.10.11.24