Sugianela et al., 2020 - Google Patents
Pearson correlation attribute evaluation-based feature selection for intrusion detection systemSugianela et al., 2020
- Document ID
- 9902588417363472031
- Author
- Sugianela Y
- Ahmad T
- Publication year
- Publication venue
- 2020 International Conference on Smart Technology and Applications (ICoSTA)
External Links
Snippet
IDS helps to overcome the network attack by taking appropriate preventive measures. The data mining method has good adaptability to new attack types; however, it consumes much time for high dimensional data. Therefore, the system needs a reduction of that high …
- 238000001514 detection method 0 title description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6251—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sugianela et al. | Pearson correlation attribute evaluation-based feature selection for intrusion detection system | |
Wang et al. | Locational detection of the false data injection attack in a smart grid: A multilabel classification approach | |
Sarker | CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks | |
Guo et al. | A two-level hybrid approach for intrusion detection | |
US20200082097A1 (en) | Combination of Protection Measures for Artificial Intelligence Applications Against Artificial Intelligence Attacks | |
Khalvati et al. | Intrusion detection based on a novel hybrid learning approach | |
Kocher et al. | Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset | |
Chandola | Anomaly detection for symbolic sequences and time series data | |
Ganapathy et al. | A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection | |
Zhang et al. | Intrusion detection method based on information gain and ReliefF feature selection | |
Canbay et al. | A hybrid method for intrusion detection | |
US20220279045A1 (en) | Global iterative clustering algorithm to model entities' behaviors and detect anomalies | |
Enache et al. | Intelligent feature selection method rooted in Binary Bat Algorithm for intrusion detection | |
Lei et al. | HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis | |
Dou et al. | Pc 2 a: predicting collective contextual anomalies via lstm with deep generative model | |
Ahmadi et al. | Efficient feature selection for intrusion detection systems | |
Cai et al. | BS-SC: An unsupervised approach for detecting shilling profiles in collaborative recommender systems | |
Sharma et al. | Optimization of ids using filter-based feature selection and machine learning algorithms | |
Sridevi et al. | Network intrusion detection system using supervised learning based voting classifier | |
Bhati et al. | A new ensemble based approach for intrusion detection system using voting | |
Zhang et al. | A hybrid intrusion detection method based on improved fuzzy C-means and support vector machine | |
He et al. | Ensemble feature selection for improving intrusion detection classification accuracy | |
Singh et al. | User behaviour based insider threat detection in critical infrastructures | |
Oh et al. | Advanced insider threat detection model to apply periodic work atmosphere | |
Thanh et al. | An approach to reduce data dimension in building effective network intrusion detection systems |