2016
DOI: 10.1007/s40815-016-0160-6
|View full text |Cite
|
Sign up to set email alerts
|

Attack’s Feature Selection-Based Network Intrusion Detection System Using Fuzzy Control Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Rule-based classification is applied to detect the intrusions. The evaluated result shows the improvement in efficiency compared with other techniques [12].…”
Section: Background Studymentioning
confidence: 81%
See 1 more Smart Citation
“…Rule-based classification is applied to detect the intrusions. The evaluated result shows the improvement in efficiency compared with other techniques [12].…”
Section: Background Studymentioning
confidence: 81%
“…It is an influential tool for analysis and difficult to find the high dimensions. While reducing the number of dimensions and found the patterns then which can be compressed without any loss of dimensions [4,12]. Feature selection is applied to raise the efficiency and decline the false positive rate.…”
Section: Kdd Cup Dataset Descriptionmentioning
confidence: 99%
“…In [20] an entropy based feature selection method has been used with layered classifier based on fuzzy rules generated by a layered fuzzy control language. It was found that the layered classifier improved performance and reduced classification time.…”
Section: Related Workmentioning
confidence: 99%
“…Azad et al [11] introduced an intrusion detection system which is based on the fuzzy min, fuzzy max neural network and the particle swarm optimization. Ramakrishnan et al [12] proposed an entropy-based feature selection to select the important features, layered fuzzy control language to generate fuzzy rules, and layered classifier to detect various network attacks namely neptune, smurf, back, and mailbomb. However, no research could be found on fuzzy methods of detecting exploitation within a single system.…”
Section: Related Workmentioning
confidence: 99%