2012
DOI: 10.1007/978-3-642-32639-4_60
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 11 publications
3
15
0
Order By: Relevance
“…Three detectors performed better than the Shannon and the Ubriaco detectors, which showed very similar results. With respect to the FPR, the advantage of the Tsallis and Rényi detectors over the Shannon detector is in accordance with Lima et al 27 and Berezinski et al 31 The receiver operating curves for scenarios 4, 6, and 7 are provided in Figures 3 to 5 be seen that in all three cases, the curve for the Rényi detector is nearest to the lower right corner, which indicates the best performance. Figures 6 and 7 present the dependency of the TPR and FPR on the CUSUM threshold parameter for the tested detectors in scenarios 2 and 3, respectively.…”
Section: Performance Evaluationsupporting
confidence: 83%
See 1 more Smart Citation
“…Three detectors performed better than the Shannon and the Ubriaco detectors, which showed very similar results. With respect to the FPR, the advantage of the Tsallis and Rényi detectors over the Shannon detector is in accordance with Lima et al 27 and Berezinski et al 31 The receiver operating curves for scenarios 4, 6, and 7 are provided in Figures 3 to 5 be seen that in all three cases, the curve for the Rényi detector is nearest to the lower right corner, which indicates the best performance. Figures 6 and 7 present the dependency of the TPR and FPR on the CUSUM threshold parameter for the tested detectors in scenarios 2 and 3, respectively.…”
Section: Performance Evaluationsupporting
confidence: 83%
“…Ferreira Lima et al used data clustering, applied to KDD Cup 99 dataset . SimpleKMeans and FarthestFirst algorithms were used for data clustering.…”
Section: Related Workmentioning
confidence: 99%
“…He reported that for scan anomalies α-value around 0.5 is the best choice. A comparative study of the use of the Shannon, Renyi and Tsallis entropy for attribute selecting to obtain an optimal attribute subset, which increases the detection capability of decision tree and k-means classifiers was presented by Lima et al [83]. The experimental results demonstrate that the performance of the models built with smaller subsets of attributes is comparable and sometimes better than that associated with the complete set of attributes for DoS and scan attack categories.…”
Section: Detection Via Feature Distributionssupporting
confidence: 40%
“…Among the various proposals the interesting applications concerned, for instance, the work of [28] where the authors applied both entropies for variable selection in computer networks intrusion detection, analyzing models detection capabilities while providing a set of attributes coming from the network traffic. Their results showed that selecting attributes based on the Rènyi and Tsallis entropies can achieve better results as compared to the Shannon entropy.…”
Section: Classification Trees With Entropy Measuressupporting
confidence: 38%