TENCON 2017 - 2017 IEEE Region 10 Conference 2017
DOI: 10.1109/tencon.2017.8227975
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly based intrusion detection using filter based feature selection on KDD-CUP 99

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 14 publications
0
16
0
1
Order By: Relevance
“…In these years, machine learning algorithms are adopted to detect cyber-attacks against infrastructure and networks. Particularly, deep learning approaches are adopted to detect cyber-attacks by training the algorithm with the KDDCUP99 [ 17 ], while random forest, decision tree and gradient boost algorithms are adopted to implement intrusion detection system with KDDCUP99 [ 18 , 19 , 20 ] and naïve bayes algorithms are adopted for cyber-protection in [ 21 ]. In order to design and validate efficient and accurate protection systems to detect ICT attacks, the availability of public datasets is a critical point in the research world.…”
Section: Related Workmentioning
confidence: 99%
“…In these years, machine learning algorithms are adopted to detect cyber-attacks against infrastructure and networks. Particularly, deep learning approaches are adopted to detect cyber-attacks by training the algorithm with the KDDCUP99 [ 17 ], while random forest, decision tree and gradient boost algorithms are adopted to implement intrusion detection system with KDDCUP99 [ 18 , 19 , 20 ] and naïve bayes algorithms are adopted for cyber-protection in [ 21 ]. In order to design and validate efficient and accurate protection systems to detect ICT attacks, the availability of public datasets is a critical point in the research world.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed method utilized naive Bayes algorithm to combine the results of base classifiers in ensemble. Kushwaha et al [40] determined the most appropriate feature selection algorithm to select the relevant features of KDD Cup 99 dataset. Thirty features were successfully chosen, while various classifiers were also used for classification.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…The 41 features labelled as either special attack type (DOS, U2R, R2L, and Probe) or normal. It is believed that attacks can be detected with the knowledge learned from the registered attacks [23]. Although widely used, this dataset has inherent flaws [2].…”
Section: Kdd99 Datasetmentioning
confidence: 99%