2022
DOI: 10.22266/ijies2022.1031.51
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection of The Anomaly Network Intrusion Detection Based on Restoration Particle Swarm Optimization

Abstract: Intrusion detection systems are vital for detecting networking attacks due to their ability to analyze network data and find different types of attacks. The high-dimensional internet data leads to feature selection becoming a fundamental process in network intrusion detection systems. The current approaches are insufficient to determine the most effective features in the network data due to the nature of intrusion attacks appearance compared to the normal data. Moreover, the wrapper feature selection methods s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…High mutual information indicates that the feature is good to differentiate between classes, making more valuable information in feature. Mutual information score is defined in Eq (1).…”
Section: (Contingency Table) Contingency Table or Also Known As Cross...mentioning
confidence: 99%
See 1 more Smart Citation
“…High mutual information indicates that the feature is good to differentiate between classes, making more valuable information in feature. Mutual information score is defined in Eq (1).…”
Section: (Contingency Table) Contingency Table or Also Known As Cross...mentioning
confidence: 99%
“…The growth of the information and communication technology is considered massive. However, various threats to user security, information and communication infrastructure also grow [1], which include data theft, fraud, ransomware, and things that threaten communication and information infrastructure, such as Denial of Service (DoS). Thus, dealing with information and communication security threats requires appropriate handling mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…Removing relevant features when combined with others will lead to detection errors and bias. To overcome this issue, the wrapper-based method was proposed [20]. The wrapper effectively increases IDS accuracy, but training takes a long time.…”
Section: Related Workmentioning
confidence: 99%
“…Chikkalwar and Garapati [17] integrated autoencoder, support vector machine (SVM), and GOA for effective detection of network intrusions. The presented model effectively resolves overfitting and data imbalance issues in the intrusion detection, but it has an issue of high computational time, Aziz and Alfoudi [18] developed a new network intrusion detection model named restoration particle swarm optimization (RPSO) for selecting relevant features from the NSL-KDD database. Sandhya and Kumarappan [19] used spider monkey optimization algorithm, and Krishna and Arunkumar [20] implemented a hybrid model: PSO and gray wolf optimization (GWO) for IoT based network intrusion…”
Section: Related Workmentioning
confidence: 99%