2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) 2020
DOI: 10.1109/iemtronics51293.2020.9216403
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection for Deep Neural Networks in Cyber Security Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…IDS plays a vital role in network security as its objective is to prevent disruption in the communication network. Ideally, static probability, neural networks, and deep learning algorithms will be used to evaluate if data are malicious or not [9]. To overcome signaturebased attack classification drawbacks, the research focuses on dynamic approaches based on machine learning.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…IDS plays a vital role in network security as its objective is to prevent disruption in the communication network. Ideally, static probability, neural networks, and deep learning algorithms will be used to evaluate if data are malicious or not [9]. To overcome signaturebased attack classification drawbacks, the research focuses on dynamic approaches based on machine learning.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…Here, actions of the network are learned by using the data recorded to identify new types of attacks. Work on machine learning has expanded the security of the systems overall [9], and the major research topic in network security is IDS due to the significant impact of attacks and violations in real-time user applications [9]. Denning et al [10] specify an efficient model of real-time IDS systems that can detect penetration and break-in of attacks in computer attacks.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…This operation removes unwanted features based on the feature importance top score and uses the feature ranking, leading to increased learning algorithm performance [39], [40]. Also, this process provides the model with the removal of the redundant information and improvement in the generalization [41]. Many techniques are used for feature selection, such as Gain Ratio (GR), Symmetrical uncertainty, Chi-Square analysis, Information Gain (IG), and Practical Swarm Optimization (PSO) [42], [43].…”
Section: Effectiveness Of Dimensionality Reduction For Feature Selectionmentioning
confidence: 99%
“…The Min-Max normalization [28] is among the most commonly used normalization [29] [30] [31]. Min-Max implements linear transformation on the data.…”
Section: Related Workmentioning
confidence: 99%