Proceedings of the 43rd Annual Southeast Regional Conference - Volume 2 2005
DOI: 10.1145/1167253.1167288
|View full text |Cite
|
Sign up to set email alerts
|

Decision tree classifier for network intrusion detection with GA-based feature selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
124
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 274 publications
(125 citation statements)
references
References 21 publications
0
124
0
1
Order By: Relevance
“…1 Comparison of feature selection studies for network traffic anomaly detection not specified. For the same data set, in Stein et al (2005) a genetic algorithm (GA) wrapper with a DTC as a validation model looks for relevant features. They are shown for the DoS type of attack case.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…1 Comparison of feature selection studies for network traffic anomaly detection not specified. For the same data set, in Stein et al (2005) a genetic algorithm (GA) wrapper with a DTC as a validation model looks for relevant features. They are shown for the DoS type of attack case.…”
Section: Related Workmentioning
confidence: 99%
“…4). f20 is usually scorned also in related works, except for Stein et al (2005), which utilizes the KDD Cup'99 (where also f20 is 0 for all observations).…”
Section: Feature Weighting and Rankingmentioning
confidence: 99%
“…However, Gary Stein et al [15] suggest that not all 41 features are required for classification of four categories of attack: Probe, DOS, U2R and R2L. In their work they used Genetic Algorithm to select relevant features for decision tree, with a goal of increasing detection rate and decreasing false alarm rate.…”
Section: Decision Treementioning
confidence: 99%
“…Feature Selection is used to minimise the number of metrics in a given dataset and to optimise the selection process of the most relevant set of metrics [2]. These techniques play an important role in improving the efficiency of IDSs, producing more accurate results.…”
Section: Introductionmentioning
confidence: 99%