TCP/IP Feature Reduction in Intrusion Detection

被引:0
|
作者
LIU Yuling
机构
关键词
intrusion detection; feature reduction; decision tree; data mining;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Due to the amount of data that an IDS needs to exam- ine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of re- duced features better than primary features by experimental re- sults.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [1] Research on the feasibility of TCP/IP feature reduction for intrusion detection
    Tian, Jun-Feng
    Wang, Hui-Ran
    Fu, Yue
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (09): : 2248 - 2251
  • [2] TCP/IP Model and Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 90 - 96
  • [3] TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems
    Wang, Xiaojun
    Cronin, Brendan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (03) : 63 - 76
  • [4] Evolutive modeling of TCP/IP network traffic for intrusion detection
    Neri, F
    REAL-WORLD APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2000, 1803 : 214 - 223
  • [5] Feature reduction and fuzzy belief intrusion detection design
    Chou, Te-Shun
    Yen, Kang K.
    Luo, Jun
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2007, : 262 - 267
  • [6] An efficient feature reduction technique for intrusion detection system
    Singh, Shailendra
    Silakari, Sanjay
    Patel, Ravindra
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 147 - 153
  • [7] Mining TCP/IP traffic for network intrusion detection by using a distributed Genetic Algorithm
    Neri, F
    MACHINE LEARNING: ECML 2000, 2000, 1810 : 313 - 322
  • [8] An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint
    Fu, Bo
    Xiao, Yang
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 13 - 17
  • [9] Intrusion Detection System Based on RNN Classifier for Feature Reduction
    Bhushan Deore
    Surendra Bhosale
    SN Computer Science, 2022, 3 (2)