2012
DOI: 10.5121/ijnsa.2012.4604
|View full text |Cite
|
Sign up to set email alerts
|

Mining Techniques in Network Security to Enhance Intrusion Detection Systems

Abstract: In intrusion detection systems, classifiers still suffer from several drawbacks such as data dimensionality and dominance, different network feature types, and data impact on the classification. In this paper two significant enhancements are presented to solve these drawbacks. The first enhancement is an improved feature selection using sequential backward search and information gain. This, in turn, extracts valuable features that enhance positively the detection rate and reduce the false positive rate. The se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…As most of the classifiers do not accept categorical features [24], data mapping technique was used to transform the nonnumeric values of the features into numeric ones, named categorical in MATLAB.…”
Section: B Experimental Setup and Data Pre-processingmentioning
confidence: 99%
“…As most of the classifiers do not accept categorical features [24], data mapping technique was used to transform the nonnumeric values of the features into numeric ones, named categorical in MATLAB.…”
Section: B Experimental Setup and Data Pre-processingmentioning
confidence: 99%
“…Thus, there is the urgent need to combine and correlate a large volume of data from multiple distributed sites in order to have a more comprehensive view of malicious activities that may occur and that would have gone undetected if considered in isolation. A number of research works are devoted to the study of collaborative systems for detecting massive large scale security threats [18,17,16]; however, possibly competitor distrusting organizations (e.g., different financial institutions) can be reluctant to fully adopt such collaborative approach as this imply sharing information that can be potentially sensitive. In these competitive contexts, a trusted and controllable environment should be provided, which provides specific guarantees that a number of requirements on the management of the data are continuously met.…”
Section: Introductionmentioning
confidence: 99%
“…It can be clearly seen in the figure that generic attack is a big thread for UDP. Classifiers of Intrusion Detection System still have many drawbacks [7]. Therefore it is not good to only relay on IDS.…”
mentioning
confidence: 99%