Machine Learning for Computer and Cyber Security 2019
DOI: 10.1201/9780429504044-8
|View full text |Cite
|
Sign up to set email alerts
|

Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 1 publication
0
22
0
Order By: Relevance
“…Some of the popular algorithms in this category are: Particle Swarm Optimization, Ant Colony Optimization, Honey Bee Swarm Optimization, Monkey Optimization, Cuckoo Search, Bat Algorithm, Bees Algorithm, Firefly Algorithm, Social Spider Algorithm, and so forth. 11 Physics-based algorithms operate according to the principles and rules of physics observed in the universe. Some of the well-known techniques in this category are: Simulated Annealing, Multi-Verse Optimizer, Gravitational Search, Tabu Search, Galaxy Based Search, Nuclear Reaction Optimization, Equilibrium Optimizer, Wind-Driven Optimization, etc.…”
Section: Advantages Of Metaheuristic Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of the popular algorithms in this category are: Particle Swarm Optimization, Ant Colony Optimization, Honey Bee Swarm Optimization, Monkey Optimization, Cuckoo Search, Bat Algorithm, Bees Algorithm, Firefly Algorithm, Social Spider Algorithm, and so forth. 11 Physics-based algorithms operate according to the principles and rules of physics observed in the universe. Some of the well-known techniques in this category are: Simulated Annealing, Multi-Verse Optimizer, Gravitational Search, Tabu Search, Galaxy Based Search, Nuclear Reaction Optimization, Equilibrium Optimizer, Wind-Driven Optimization, etc.…”
Section: Advantages Of Metaheuristic Algorithmsmentioning
confidence: 99%
“…A number of academics have contended that ML approaches are more adept at managing novel botnet variations than traditional techniques. 11 They are more able to identify new botnet threats because of their capacity to learn from patterns and extrapolate from available data. Additionally, ML can effectively be utilized for encrypted botnet identification by evaluating flow-based data without the need for deep packet inspection.…”
Section: Introductionmentioning
confidence: 99%
“…Feature selection has been used in a wide range of problems, including image processing, sentiment analysis, intrusion detection, and language identification as well as many other domains [61][62][63][64][65][66][67]. However, one of the challenges that still needs be overcome in respect of the use of FS process is its use in the field of medical diagnosis, which is the focus of this research.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, selecting a smaller subset of predictors through nding the most-related predictors is crucial because it reduces the amount of time required for data collection and computing while also avoiding over tting in prediction models [13]. Feature selection methods were developed to lter out obsolete and redundant predictors in order to obtain the smallest and most successful subset of predictors, which decreases computation time in addition to increasing prediction accuracy [14] Despite some developments, the current FS methods for large feature sets are still insu cient [15]. They are technically feasible, but far from optimal, or they are optimum or nearly optimum but can not handle the computational complexity of FS problems of realistic, or real-world size [4].…”
Section: Introductionmentioning
confidence: 99%