2012 IEEE 12th International Conference on Data Mining Workshops 2012
DOI: 10.1109/icdmw.2012.56
|View full text |Cite
|
Sign up to set email alerts
|

Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks

Abstract: Cloud computing is expected to provide ondemand, agile, and elastic services. Cloud networking extends cloud computing by providing virtualized networking functionalities and allows various optimizations, for example to reduce latency while increasing flexibility in the placement, movement, and interconnection of these virtual resources. However, this approach introduces new security challenges. In this paper, we propose a new intrusion detection model in which we combine a newly proposed genetic based feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…For analysing the overall performance of Hybrid-NIDS, we have derived weighted average for the applied tests. Weighted average can be derived by the relation In table 7, performances of recent NIDS approaches from [44][45][46][47][48][49] are compared to that of Hybrid-NIDS. These approaches use soft computing techniques for intrusion detection, and they are evaluated on KDD dataset.…”
Section: Results and Analysismentioning
confidence: 99%
“…For analysing the overall performance of Hybrid-NIDS, we have derived weighted average for the applied tests. Weighted average can be derived by the relation In table 7, performances of recent NIDS approaches from [44][45][46][47][48][49] are compared to that of Hybrid-NIDS. These approaches use soft computing techniques for intrusion detection, and they are evaluated on KDD dataset.…”
Section: Results and Analysismentioning
confidence: 99%
“…With hybrid IDS , first, known attacks are detected and separated by matching with the attack signatures and then among the remaining stream the unknown attacks are detected by observing deviations of such packet features from those of the normal packets. [9], DT [25], Naïve Bayes [12], SVM [21], RF [30], NN [26], etc. are mostly used by many researchers for the construction of IDS.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Dimensionality reduction is the process of transforming original raw features into the new dimensions (reduced set of features) by preserving the originality of the data. Correlation Feature Selection (CFS) [12], [23] and Principal Co mponent Analysis (PCA) [15], [19], [23] are the examp les of Dimensionality reduction techniques.…”
Section: Dimensionality Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Outliers are important because they might change the behaviour of the model as they are far from the discovered patterns and are mostly known as noise or exceptions. Outliers are useful in some applications such as fraud and anomaly detection approaches as the rare cases are more interesting than the normal cases [66]. Outlier analysis is another concept of learning and mining approaches known as outlier mining [67].…”
Section: Outliermentioning
confidence: 99%