[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sugianela et al., 2020 - Google Patents

Pearson correlation attribute evaluation-based feature selection for intrusion detection system

Sugianela et al., 2020

Document ID
9902588417363472031
Author
Sugianela Y
Ahmad T
Publication year
Publication venue
2020 International Conference on Smart Technology and Applications (ICoSTA)

External Links

Snippet

IDS helps to overcome the network attack by taking appropriate preventive measures. The data mining method has good adaptability to new attack types; however, it consumes much time for high dimensional data. Therefore, the system needs a reduction of that high …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6251Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps

Similar Documents

Publication Publication Date Title
Sugianela et al. Pearson correlation attribute evaluation-based feature selection for intrusion detection system
Wang et al. Locational detection of the false data injection attack in a smart grid: A multilabel classification approach
Sarker CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks
Guo et al. A two-level hybrid approach for intrusion detection
US20200082097A1 (en) Combination of Protection Measures for Artificial Intelligence Applications Against Artificial Intelligence Attacks
Khalvati et al. Intrusion detection based on a novel hybrid learning approach
Kocher et al. Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset
Chandola Anomaly detection for symbolic sequences and time series data
Ganapathy et al. A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection
Zhang et al. Intrusion detection method based on information gain and ReliefF feature selection
Canbay et al. A hybrid method for intrusion detection
US20220279045A1 (en) Global iterative clustering algorithm to model entities' behaviors and detect anomalies
Enache et al. Intelligent feature selection method rooted in Binary Bat Algorithm for intrusion detection
Lei et al. HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis
Dou et al. Pc 2 a: predicting collective contextual anomalies via lstm with deep generative model
Ahmadi et al. Efficient feature selection for intrusion detection systems
Cai et al. BS-SC: An unsupervised approach for detecting shilling profiles in collaborative recommender systems
Sharma et al. Optimization of ids using filter-based feature selection and machine learning algorithms
Sridevi et al. Network intrusion detection system using supervised learning based voting classifier
Bhati et al. A new ensemble based approach for intrusion detection system using voting
Zhang et al. A hybrid intrusion detection method based on improved fuzzy C-means and support vector machine
He et al. Ensemble feature selection for improving intrusion detection classification accuracy
Singh et al. User behaviour based insider threat detection in critical infrastructures
Oh et al. Advanced insider threat detection model to apply periodic work atmosphere
Thanh et al. An approach to reduce data dimension in building effective network intrusion detection systems