Proceedings From the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
DOI: 10.1109/iaw.2004.1437817
|View full text |Cite
|
Sign up to set email alerts
|

Dimension reduction using feature extraction methods for real-time misuse detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Each labeled TCP session is either normal or a member of one of the 22 attack classes in the dataset. The first 5 features are selected, namely (1) Src_Bytes, (2) Dst_Bytes, (3) Duration, (4) Is_Host_Login, and (5) Is_Guest_Login, based on the results of Gopi et al [8] which are based on the Screen Test and Critical Eigenvalue test. The objective of selection of a subset out of all the features is to assess the robustness of our system.…”
Section: Kdd Cup 1999 Data Setmentioning
confidence: 99%
See 1 more Smart Citation
“…Each labeled TCP session is either normal or a member of one of the 22 attack classes in the dataset. The first 5 features are selected, namely (1) Src_Bytes, (2) Dst_Bytes, (3) Duration, (4) Is_Host_Login, and (5) Is_Guest_Login, based on the results of Gopi et al [8] which are based on the Screen Test and Critical Eigenvalue test. The objective of selection of a subset out of all the features is to assess the robustness of our system.…”
Section: Kdd Cup 1999 Data Setmentioning
confidence: 99%
“…Intrusion detection systems (IDS) [11] have become popular tools for identifying anomalous and malicious activities in computer systems and networks [8]. Anomaly detection is a key element of intrusion detection and other detection systems in which perturbations from normal behavior suggest the presence of attacks, defects etc.…”
Section: Introductionmentioning
confidence: 99%
“…It is well known that principal component analysis (PCA) is one of the most popular feature reduction and data compression methods that have also been applied to design IDS [15]. In [16], neural network principal component analysis (NNPCA) and nonlinear component analysis (NLCA) are discussed to reduce the dimension of network traffic patterns by comparing information of the compressed data with that of the original data. In [17], PCA has been used to detect selected denial-of-service and network probe attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It is well known that principal component analysis (PCA) is an essential technique in data compression and feature extraction [11], and it has been also applied to the field of ID [12][13][14]. It is well known that PCA has been widely used in data compression and feature selection.…”
Section: B Principle Components Analysismentioning
confidence: 99%
“…This is very important if real-time detection is desired. Principal component analysis (PCA) is an essential technique in data compression and feature selection [11] which has been applied to the field of ID [12,14]. PCA [15] is an efficient method to reduce dimensionality by providing a linear map of n-dimensional feature space to a reduced m-dimensional feature space.…”
Section: Introductionmentioning
confidence: 99%