2015 International Conference on Computer Communication and Informatics (ICCCI) 2015
DOI: 10.1109/iccci.2015.7218109
|View full text |Cite
|
Sign up to set email alerts
|

Genetic algorithm based feature selection approach for effective intrusion detection system

Abstract: Intrusion detection system (IDS) is the system whichidentifies malicious activity on the network. As the Internet volume is increasing rapidly, security against the real time attacks and their fast detection issues gain attention of many researchers. Data mining methods can be effectively applied to (IDS) to tackle the problems of dynamic huge network data and to improve IDS performance. We can reduce the time complexity by selecting only useful features to build model for classification. There are many featur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(28 citation statements)
references
References 7 publications
0
28
0
Order By: Relevance
“…We first analyze and compare the training time of classifiers using different feature fusion techniques based on different datasets. For the KDD dataset series (DARPA99, KDD99, and KDD99 10%), we can find that the training time of network intrusion classifier using the following feature fusion techniques is shorter than others, such as GFR, FRM-SFM [18], and CART [23]; CFS-GA [25] is very efficient for the NSL-KDD dataset; based on the Kyoto 2006+ dataset, PLS [12] helps to reduce time consumption of classifier training. In summary, these mentioned fusion techniques are outstandingly efficient in the training time of network behavior classifier.…”
Section: Comparison Of Feature Fusion Techniquesmentioning
confidence: 97%
“…We first analyze and compare the training time of classifiers using different feature fusion techniques based on different datasets. For the KDD dataset series (DARPA99, KDD99, and KDD99 10%), we can find that the training time of network intrusion classifier using the following feature fusion techniques is shorter than others, such as GFR, FRM-SFM [18], and CART [23]; CFS-GA [25] is very efficient for the NSL-KDD dataset; based on the Kyoto 2006+ dataset, PLS [12] helps to reduce time consumption of classifier training. In summary, these mentioned fusion techniques are outstandingly efficient in the training time of network behavior classifier.…”
Section: Comparison Of Feature Fusion Techniquesmentioning
confidence: 97%
“…In the other hand, the work by K. S. Desale et al [12] shows the use of GA, which is chosen as a standout amongst the most ground-breaking instruments to look in a huge space with the possibility to locate the best arrangement in the pursuit space. Notwithstanding, in the later advancement of the populace, a bigger hybrid and change likelihood may result in the loss of good qualities and postponed intermingling of the calculation.…”
Section: Outcome Of the Parallel Research Workmentioning
confidence: 99%
“…Lemma -2: The inferable rulesets from any rule engine is more effective to detect more number of attacks from any dataset. Where, A is the set of identified and known attacks can be defined as Hence, the rulesets defining the characteristics can also possibly be inferred as, 12 FF  (Eq. 14) As, the Eq.…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Desale and Ade [28] propose a Genetic Algorithm based Feature Selection Approach for Effective Intrusion Detection System. The genetic algorithm is used to search method when selecting features from the full NSL-KDD dataset.…”
Section: Tesfahun and Bhaskarimentioning
confidence: 99%