A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bhaskar, Thupakula
- A Novel Approach for Feature Selection Technique in NSL-KDD Data Set of Cyber Security
Authors
1 SSSUTMS, Bhopal, M.P., IN
2 PVPSIT, Vijayawada, A.P., IN
Source
Indian Journal of Automation and Artificial Intelligence, Vol 6, No 6 (2019), Pagination: 1-5Abstract
Background/Objectives: To design the best and worst solution and also to minimise false alarm rate and maximize the detection rate by using AJO
Methods/Statistical analysis: The Adaptive Jaya Optimization (AJO) technique is used to select best features among 41 features.
Findings: The intrusion detection work focuses on feature selection, because few of the features are inappropriate and additional which results prolonged detection procedure and diminishes the performance of an intrusion detection system (IDS). With AJO technique best 17 features were selected to have best accuracy.
Application: In this study the NSL-KDD data set is analysed and applied Adaptive Jaya Technique for selecting best features to minimize low false alarm rate & maximize detection rate.
Keywords
Intrusion Detection System, NSL-KDD Dataset, Feature Selection, Adaptive Jaya Optimization.References
- S.M.H. Bamakan, H. Wang, T. Yingjie, Y. Shi. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing. 2016; 199, 90-102.
- N. Ben-Asher, C. Gonzalez. Effects of cyber security knowledge on attack detection. Computers in Human Behavior. 2015; 48, 51-61.
- R.A.R. Ashfaq, X.Z. Wang, J.Z. Huang, H. Abbas, Y.L. He. Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences. 2017; 378, 484-497.
- M. Masud, B. Thuraisingham, L. Khan. Data mining tools for malware detection. Auerbach Publications. 2011.
- J.M. Fossaceca, T.A. Mazzuchi, S. Sarkani. MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection. Expert Systems with Applications. 2015; 42(8), 4062-4080.
- R. Venkata Rao Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. International Journal of Industrial Engineering Computations. 2016;
- , 19–34 7. H. Liu, R. Setiono, H. Motoda, Z. Zhao. Feature Selection: An Ever Evolving Frontier in Data Mining, JMLR: Workshop and Conference Proceedings. 2010; 10, 4-13.
- H. Chae, B. Jo, S.H. Choi, T. Park. Feature selection for intrusion detection using NSL-KDD. In: Proceedings of the 12th WSEAS International Conference on Information Security and Privacy. 2013; 184–187.