Identifying important features for intrusion detection using discriminant analysis and support vector machine

被引:0
|
作者
Wong, Wai-Tak [1 ]
Lai, Cheng-Yang [1 ]
机构
[1] Chung Hua Univ, Dept Informat Management, 707 Sec 2,WuFu Rd, Hsinchu, Taiwan
关键词
network intrusion detection; discriminant analysis; feature selection; support vector machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A lightweight network intrusion detection system is more efficient and effective for the real world requirement. Higher performance may result if the insignificant and/or useless features can be eliminated. Discriminant Analysis can identify the significance of the examined features. In this paper Discriminant Analysis and Support Vector Machine are combined to detect network intrusion. Empirical results indicate that using the important feature set extracted from the Discriminant Analysis can get, nearly the same performance as the full feature set. A comparative study of using different feature selection methods is also shown to prove the usefulness of our approach.
引用
收藏
页码:3563 / +
页数:2
相关论文
共 50 条
  • [41] Prediction of the ripening stages of papayas using discriminant analysis and support vector machine algorithms
    Zulkifli, Nurazwin
    Hashim, Norhashila
    Harith, Hazreen Haizi
    Mohamad Shukery, Mohamad Firdza
    Onwude, Daniel I.
    JOURNAL OF THE SCIENCE OF FOOD AND AGRICULTURE, 2022, 102 (08) : 3266 - 3276
  • [42] Intrusion Detection using An Ensemble of Support Vector Machines
    Kumar, G. Kishor
    Kumar, R. Raja
    Basha, M. Suleman
    Reddy, K. Nageswara
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 266 - 275
  • [43] Support Vector Machine Based Detection of Drowsiness Using Minimum EEG Features
    Yu, Shaoda
    Li, Peng
    Lin, Honghuang
    Rohani, Ehsan
    Choi, Gwan
    Shao, Botang
    Wang, Qian
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 827 - 835
  • [44] Efficient Driver Drowsiness Detection Using Spatiotemporal Features with Support Vector Machine
    Lamouchi, Dorra
    Yaddaden, Yacine
    Parent, Jerome
    Cherif, Raef
    INTERNATIONAL JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS RESEARCH, 2025,
  • [45] Features Selection for Intrusion Detection Systems Based on Support Vector Machines
    Zaman, Safaa
    Karray, Fakhri
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1066 - 1073
  • [46] Network intrusion detection based on random forest and support vector machine
    Chang, Yaping
    Li, Wei
    Yang, Zhongming
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 635 - 638
  • [47] DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine
    Wang, Lingren
    Li, Jingbing
    Cheng, Jieren
    Bhatti, Uzair Aslam
    Dai, Qianning
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 286 - 297
  • [48] CFAR intrusion detection method based on support vector machine prediction
    He, D
    Leung, H
    2004 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MEASUREMENT SYSTEMS AND APPLICATIONS, 2004, : 10 - 15
  • [49] Research on Intrusion Detection Based on Kohonen Network and Support Vector Machine
    Shuai, Chunyan
    Yang, Hengcheng
    Gong, Zeweiyi
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [50] Network Intrusion Detection Method of Support Vector Machine Based On QPSO
    Wen, Xiu-mei
    Zhao, Wei
    Liu, Tie-ying
    Meng, Fan-xing
    ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 283 - 287