TCP/IP Feature Reduction in Intrusion Detection

被引:0
|
作者
LIU Yuling
机构
关键词
intrusion detection; feature reduction; decision tree; data mining;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Due to the amount of data that an IDS needs to exam- ine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of re- duced features better than primary features by experimental re- sults.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [41] An optimized maximum correlation based feature reduction scheme for intrusion detection in data networks
    Shashank Gavel
    Ajay Singh Raghuvanshi
    Sudarshan Tiwari
    Wireless Networks, 2022, 28 : 2609 - 2624
  • [42] Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system
    Li, Jing
    Chen, Hewan
    Shahizan, Mohd Othman
    Yusuf, Lizawati Mi
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2024, 23
  • [43] Parallel algorithm of feature reduction in intrusion data
    Institute of Communication Engineering, PLA University of Science and Technology, Nanjing 210007, China
    不详
    Dianzi Keji Diaxue Xuebao, 2008, 2 (266-269):
  • [44] TCP/IP
    NUSSBACHER, H
    DATAMATION, 1986, 32 (16): : 19 - 19
  • [45] Intrusion Detection System for Identification of Throughput Degradation Attack on TCP
    Bhandari, Ashish
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [46] Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
    Goldenberg, Niv
    Wool, Avishai
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (02) : 63 - 75
  • [47] An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM
    Lu, Guanyu
    Tian, Xiuxia
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [49] A feature classification scheme for network intrusion detection
    Faculty of Computer Science, University of New Brunswick, 540 Windsor Street, PoBox 4400, Postal Code E3B 5A3, Fredericton, NB, Canada
    Int. J. Netw. Secur., 2007, 1 (1-15): : 1 - 15
  • [50] A graphical feature generation approach for intrusion detection
    Chen, Shi
    Zuo, Zhen
    Huang, Zhi Ping
    Guo, Xiao Jun
    2016 INTERNATIONAL CONFERENCE ON ELECTRONIC, INFORMATION AND COMPUTER ENGINEERING, 2016, 44