2021
DOI: 10.11610/isij.4901
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Intrusion Detection with Decision Tree for Feature Selection

Abstract: Intrusion detection systems (IDS) typically take high computational complexity to examine data features and identify intrusion patterns due to the size and nature of the current intrusion detection datasets. Data pre-processing techniques (such as feature selection) are being used to reduce such complexity by eliminating irrelevant and redundant features in such datasets. The objective of this study is to analyse the effectiveness and efficiency of some feature selection approaches, namely wrapper-based and fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Three basic feature selection methods are explained in the next section. However, only two of these methods were mainly applied in IDS modeling, with most studies using the filter method, which generally ignores the effects of the selected feature subset on the performance of the IDS model [25]. Contrary to the wrapper method, which, though computationally expensive, produces better performance for the predefined classifier.…”
Section: Feature Selectionmentioning
confidence: 99%
“…Three basic feature selection methods are explained in the next section. However, only two of these methods were mainly applied in IDS modeling, with most studies using the filter method, which generally ignores the effects of the selected feature subset on the performance of the IDS model [25]. Contrary to the wrapper method, which, though computationally expensive, produces better performance for the predefined classifier.…”
Section: Feature Selectionmentioning
confidence: 99%
“…One of the key elements influencing how well supervised machine learning models can detect and categorize harmful intrusions is feature engineering [8]. This can be done by selecting the dataset's most significant and connected features to the model outputs, a process known as feature selection, and then creating a new feature from the already accessible ISOT-CID dataset, a process known as feature extraction [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…Under the circumstance, cybersecurity issues have been paid much more attention in various networks, such as wireless networks [1][2][3], the Internet of things [4][5][6], and vehicle networks [7,8]. To detect cyberattacks, intrusion detection system (IDS) [9][10][11][12][13][14][15][16] has become a common tool due to its serviceability and extendibility. However, the huge amount of information flow has posed a great challenge to the efficacy and efficiency of the traditional intrusion detection systems.…”
Section: Introductionmentioning
confidence: 99%