2020 International Conference on System, Computation, Automation and Networking (ICSCAN) 2020
DOI: 10.1109/icscan49426.2020.9262282
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning based Intrusion Detection Framework using Recursive Feature Elimination Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
1
2
0
Order By: Relevance
“…The RFE process identified several key features highly relevant to network intrusion detection. These features align with our expectations and prior research [18], [20], and [25], confirming the importance of specific traffic characteristics in detecting malicious activities. The combination of IF, OC-SVM and ANOVA F-test not only improved the model's performance but also reduced the complexity of the model by eliminating redundant and irrelevant features.…”
Section: E Discussion Of Resultssupporting
confidence: 90%
See 1 more Smart Citation
“…The RFE process identified several key features highly relevant to network intrusion detection. These features align with our expectations and prior research [18], [20], and [25], confirming the importance of specific traffic characteristics in detecting malicious activities. The combination of IF, OC-SVM and ANOVA F-test not only improved the model's performance but also reduced the complexity of the model by eliminating redundant and irrelevant features.…”
Section: E Discussion Of Resultssupporting
confidence: 90%
“…Empirical results show that the proposed model achieved a low false alarm rate and a high recall. Similarly, [18], [19], [20], and [21] applied machine learning techniques for network intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…To explain the logic behind RFE, every column in the dataset needs to be iterated at least one time. The feature that is proved to be the least important is deleted after each round of RFE, and the procedure should then be recurred until the features remaining are equal to the boundary case that was established by RFE before [9,10]. After gaining a fundamental understanding of RFE and contrasting it with RFC, the final ten features that are satisfied by machine learning models, along with Figure 1, are bulleted as follows: IPV4_SRC_ADDR,IPV4_DST_ADDR, L7_PROTO, IN_BYTES, OUT_BYTES, FLOW_DURATION_MILLISECONDS, DURATION_IN, MAX_IP_PKT_LEN, DST_TO_SRC_AVG_THROUGHPUT, LABEL…”
Section: Recursive Feature Elimination (Rfe)mentioning
confidence: 99%