2011
DOI: 10.1007/978-1-4614-0373-9_31
|View full text |Cite
|
Sign up to set email alerts
|

Relevance Features Selection for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…Olusola et al [21] proposed a new feature reduction technique for the KDD '99 dataset. The paper emphasized that selecting more relevant features leads to faster and more appropriate results for network attack detection.…”
Section: Literature Review Of Feature Selection Methods For Intrusion...mentioning
confidence: 99%
“…Olusola et al [21] proposed a new feature reduction technique for the KDD '99 dataset. The paper emphasized that selecting more relevant features leads to faster and more appropriate results for network attack detection.…”
Section: Literature Review Of Feature Selection Methods For Intrusion...mentioning
confidence: 99%
“…Adeola S.Oladele. And Daramola O.Abosede [9] presented the relevance of each feature in KDD '99 intrusion detection dataset to the detection of each class. Rough set degree of dependency and dependency ratio of each class were employed to determine the most discriminating features for each class.…”
Section: Related Workmentioning
confidence: 99%
“…These were gathered in two parts: an offline evaluation using network traffic and audit logs collected on a simulation network, and a real-time evaluation through Air Force Research Laboratory (AFRL). • The KDD'99 dataset [24] remains the widely accepted standard for machine learning in networking, despite its limitations. Composed of Ethernet transmissions captured for identifying known malware activity, it was released for use in developing intrusion detection systems and has been used in network research, either in its original form or the improved NSL-KDD version.…”
Section: A Chronological Survey Of Network Traffic Generatorsmentioning
confidence: 99%