2020
DOI: 10.1016/j.comnet.2020.107247
|View full text |Cite
|
Sign up to set email alerts
|

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Abstract: A B S T R A C T Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsupervised learning approaches from the field of machine learning have been used to increase the efficacy of IDSs, it is still a problem for existing intrusion detection algorithms to achieve good performance. First, lots of redundant and irrelevant data in high-dimensional datasets i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
267
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 466 publications
(272 citation statements)
references
References 76 publications
3
267
0
2
Order By: Relevance
“…An ensemble classifier using random forest, C4.5, and forest by penalizing attributes (FPA) was proposed by Zhou and Cheng [26].…”
Section: Related Workmentioning
confidence: 99%
“…An ensemble classifier using random forest, C4.5, and forest by penalizing attributes (FPA) was proposed by Zhou and Cheng [26].…”
Section: Related Workmentioning
confidence: 99%
“…In Reference [15], a similar goal was achieved using Conditional Random Fields approach. Recently, Zhou et al [16] presented the ensemble model consisting of C4.5, Random Forest and PA Forest, where the decisions are based on the average of probabilities rule (voting based on average of probabilities). The ensemble model uses feature selection by applying a hybrid approach of combination of correlation-based feature selection and biologically inspired bat algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…During the pre-processing, we mostly focused on feature selection. According to the work of Zhou and Cheng in [16], we selected only the most relevant attributes: service, src_bytes, dst_bytes, logged_in, num_file_creations, srv_count, serror_rate, rerror_rate, srv_diff_host_rate, dst_host_count, dst_host_diff_srv_rate, dst_host_srv_diff_host_rate.…”
Section: Machine Learning Models For Detection Of the Network Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…To enable comparison and analysis of the effects of feature selection, a feature selected version of each dataset is made using a wrapperbased feature selection approach with a decision tree algorithm as the feature evaluator. To determine the effect of normalization, min-max normalization, one of the most common [8] and the predominantly used normalization method in IDS modeling [5], [9], [10] is used. Using the four final datasets (full and feature selected version of each) three different IDS programs were implemented, each program contains ten distinct IDS models, with some of the models developed without applying normalization.…”
Section: Introductionmentioning
confidence: 99%