Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online Feature Ranking for Intrusion Detection Systems

Many current approaches to the design of intrusion detection systems apply feature selection in a static, non-adaptive fashion. These methods often neglect the dynamic nature of network data which requires to use adaptive feature selection techniques. In this paper, we present a simple technique based on incremental learning of support vector machines in order to rank the features in real time ...

متن کامل

Neural Networks Based Feature Selection from KDD Intrusion Detection Dataset

We present the application of a distinctive feature selection method based on neural networks to the problem of intrusion detection, in order to determine the most relevant network features. We use the same procedure for feature selection and for attack detection, which gives more consistency to the method. We apply this method to a case study and show its advantages compared to some existing f...

متن کامل

Feature Extraction Methods for Intrusion Detection Systems

Intrusion Detection Systems (IDSs) have become an important security tool for managing risk and an indispensable part of overall security architecture. An IDS is considered as a pattern recognition system, in which feature extraction is an important pre-processing step. The feature extraction process consists of feature construction and feature selection. The quality of the feature construction...

متن کامل

Performance Analysis Of Different Feature Selection Methods In Intrusion Detection

In today’s era detection of security threats that are commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Highly confidential data of various organizations are present over the network so in order to preserve that data from unauthorized users or attackers a strong security framework is required. Intrusion detection system ...

متن کامل

Study of Dataset Feature Filtering of OpCode for Malware Detection Using SVM Training Phase

Malware can be defined as any type of malicious code that has the potential to harm a computer or network. To detect unknown malware families, the frequency of the appearance of Opcode (Operation Code) sequences are used through dynamic analysis. Opcode n-gram analysis used to extract features from the inspected files. Opcode n-grams are used as features during the classification process with t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/13478-1164