TCP/IP Feature Reduction in Intrusion Detection

被引:0
|
作者
LIU Yuling
机构
关键词
intrusion detection; feature reduction; decision tree; data mining;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Due to the amount of data that an IDS needs to exam- ine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of re- duced features better than primary features by experimental re- sults.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [21] Mining TCP/IP packets to detect stepping-stone intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 479 - 484
  • [22] Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 269 - 276
  • [23] An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation
    Wei, Jinxia
    Long, Chun
    Wan, Wei
    Zhang, Yurou
    Zhao, Jing
    Du, Guanyao
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS 2019), VOL 2, 2019, : 221 - 228
  • [24] Grey wolf based feature reduction for intrusion detection in WSN using LSTM
    Karthic S.
    Manoj Kumar S.
    Senthil Prakash P.N.
    International Journal of Information Technology, 2022, 14 (7) : 3719 - 3724
  • [25] Intrusion Detection Based on Feature Reduction and Model Pruning in Electricity Trading Network
    Liu, Zhenzhen
    Zhou, Rui
    Huang, Kangqian
    Hu, Xin
    Jiang, Zhe
    Cai, Binsi
    Yuan, Kaiguo
    Journal of Computers (Taiwan), 2023, 34 (05) : 213 - 227
  • [26] Analysis of Heuristic based Feature Reduction method in Intrusion Detection System.
    Umbarkar, Swapnil
    Shukla, Sanyam
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 717 - 720
  • [27] Detection and classification of TCP/IP network services
    Tan, KMC
    Collie, BS
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 99 - 107
  • [28] Using Partial Signatures in Intrusion Detection for Multipath TCP
    Afzal, Zeeshan
    Garcia, Johan
    Lindskog, Stefan
    Brunstrom, Anna
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 71 - 86
  • [29] Intrusion Detection System Based On The Integrity of TCP Packet
    Alhamaty, Moad
    Yazdian, Ali
    Al-qadasi, Fathi
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 11, 2006, 11 : 234 - +
  • [30] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546