2020
DOI: 10.1049/trit.2020.0073
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection approach using ensemble learning for network anomaly detection

Abstract: Feature selection is essential for prioritising important attributes in data to improve prediction quality in machine learning algorithms. As different selection techniques identify different feature sets, relying on a single method may result in risky decisions. The authors propose an ensemble approach using union and quorum combination techniques with five primary individual selection methods which are analysis of variance, variance threshold, sequential backward search, recursive feature elimination, and le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(16 citation statements)
references
References 28 publications
0
16
0
Order By: Relevance
“…), it does not take into account features that characterize novel cyber attacks. Other works in the field of machine learning applied to intrusion detection rely on more recent datasets such as UNSW-NB15 [84,85,86,87]. Although quite recent, such a dataset has two limitations: first, the traffic has been collected in a reduced testbed; and secondly, the number of features is limited to 49, which is too small to appreciate the effectiveness of feature selection techniques.…”
Section: Related Work On Feature Selection Applied To Ml-based Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…), it does not take into account features that characterize novel cyber attacks. Other works in the field of machine learning applied to intrusion detection rely on more recent datasets such as UNSW-NB15 [84,85,86,87]. Although quite recent, such a dataset has two limitations: first, the traffic has been collected in a reduced testbed; and secondly, the number of features is limited to 49, which is too small to appreciate the effectiveness of feature selection techniques.…”
Section: Related Work On Feature Selection Applied To Ml-based Intrusion Detectionmentioning
confidence: 99%
“…), it does not take into account features that characterize novel cyber attacks. Other works in the field of machine learning applied to intrusion detection rely on more recent datasets such as UNSW-NB15 [84,85,86,87] Going more specifically into the set of works that share with this paper the aim to compare or survey FS methods for intrusion detection, we have collected the significant papers in Table 1. In it, we have identified the material covered in the literature, which helps appreciating the contributions of our paper.…”
Section: Related Work On Feature Selection Applied To Ml-based Intrus...mentioning
confidence: 99%
“…A minor data breach in the IoT device can make the entire network vulnerable to the attacker. So data encryption, as well as access control over data before transmission, is suggested by many researchers to prevent data from unwanted cyberattacks 9–13 . There exist various security protocols in literature, including digital signature, public‐key cryptosystems, authentication algorithms, and many more, which can ensure data security, integrity, authentication, and confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…On the basis of prediction of test dataset, images can be arranged in a semantic and meaningful order. Selection of discriminating and unique features is always beneficial as it can enhance the performance of any classification-based system [4][5][6]. In remote sensing, the problem of image classification is more challenging as objects are rotated within a view and background is usually more complex [7].…”
Section: Introductionmentioning
confidence: 99%