A Feature Selection Approach for Network Intrusion Detection
Processing huge amount of collected network data to identify network intrusions needs high computational cost. Reducing features in the collected data may therefore solve the problem. We proposed an approach for obtaining optimal number of features to build an efficient model for intrusion detection...
| Main Authors: | Khor, Kok-Chin, Ting, Choo-Yee, Amnuaisuk, Somnuk-Phon |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/1938/ |
Similar Items
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Properties of Bayesian student model for INQPRO
by: Ting, Choo-Yee, et al.
Published: (2012)
by: Ting, Choo-Yee, et al.
Published: (2012)
Affective music processing: Challenges
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005)
by: Teh, Yoke-Jin, et al.
Published: (2005)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Modeling and intervening across time in scientific inquiry exploratory learning environment
by: Ting, Choo Yee, et al.
Published: (2008)
by: Ting, Choo Yee, et al.
Published: (2008)
A Bayesian approach to classify conference papers
by: Khor, , Kok-Chin, et al.
Published: (2006)
by: Khor, , Kok-Chin, et al.
Published: (2006)
Determining a Suitable Desired Factors for Nonnegative Matrix Factorization in Polyphonic Music Transcription
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Effects of Time and Frequency Resolution on Nonnegative Matrix Factorization
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Chorale harmonization: A view from a search control perspective
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2006)
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2006)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Effects of Communication Range, Noise and Help Request Signal on Particle Swarm Optimization with Area Extension (AEPSO)
by: Atyabi, Adham, et al.
Published: (2007)
by: Atyabi, Adham, et al.
Published: (2007)
Cooperative learning of homogeneous and heterogeneous particles in Area Extension PSO
by: Atyabi, Adham, et al.
Published: (2008)
by: Atyabi, Adham, et al.
Published: (2008)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Towards music fitness evaluation with the hierarchical SOM
by: Edwin Hui Hean, Law, et al.
Published: (2008)
by: Edwin Hui Hean, Law, et al.
Published: (2008)
A Review of Recent Alignment-Free Clustering Algorithms in Expressed Sequence Tag
by: Ng, Keng-Hoong, et al.
Published: (2009)
by: Ng, Keng-Hoong, et al.
Published: (2009)
Clustering of Expressed Sequence Tag (EST) with Markov Models and Self-Organizing Maps: An Exploratory Study
by: Ng, Keng Hoong, et al.
Published: (2008)
by: Ng, Keng Hoong, et al.
Published: (2008)
Investigating Design Choices between Bitmap index and B-tree index for a Large Data Warehouse System
by: Morteza, Zaker, et al.
Published: (2008)
by: Morteza, Zaker, et al.
Published: (2008)
Evolving music generation with SOM-fitness genetic programming
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2007)
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2007)
Manufacturing Test Data Analysis-On Comparing Different Classification Algorithms
by: Lee, Jia Keat, et al.
Published: (2007)
by: Lee, Jia Keat, et al.
Published: (2007)
Intelligent learning environment: Building hybrid system from standard application and web application
by: Chee, , KS, et al.
Published: (2005)
by: Chee, , KS, et al.
Published: (2005)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Interactivities in music intelligent tutoring system
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Particle swarm optimization with area extension (AEPSO)
by: Atyabi, A, et al.
Published: (2007)
by: Atyabi, A, et al.
Published: (2007)
db4DNASeq: An Object-oriented DNA Database Model associated with Sequence Search Method
by: Ng, Keng Hoong, et al.
Published: (2008)
by: Ng, Keng Hoong, et al.
Published: (2008)
Adaptive GA: An Essential Ingredient in High-Level Synthesis
by: Choong, Florence Chiao Mei, et al.
Published: (2008)
by: Choong, Florence Chiao Mei, et al.
Published: (2008)
Texture Features Selection for Masses Detection In Digital Mammogram
by: A. M., Khuzi, et al.
Published: (2008)
by: A. M., Khuzi, et al.
Published: (2008)
Conceptual change modeling using Dynamic Bayesian network
by: Ting, Choo Yee, et al.
Published: (2006)
by: Ting, Choo Yee, et al.
Published: (2006)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Assessing learner's Scientific Inquiry Skills across time: A Dynamic Bayesian Network approach
by: Ting, Choo-Yee, et al.
Published: (2007)
by: Ting, Choo-Yee, et al.
Published: (2007)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
A feature interaction conflicts detection engine for pervasive networked environment
by: Low, H. K., et al.
Published: (2007)
by: Low, H. K., et al.
Published: (2007)
Optimizing the Data Warehouse Design by Hierarchical Denormalizing
by: Morteza, Zaker, et al.
Published: (2008)
by: Morteza, Zaker, et al.
Published: (2008)
Performance Optimization of Java Virtual Machine on Dual-Core Technology for Web Services - A Study
by: Mun, Chong Kam, et al.
Published: (2007)
by: Mun, Chong Kam, et al.
Published: (2007)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Automated Detection of Anesthetic Depth Levels Using Chaotic Features with Artificial Neural Networks
by: Lalitha, V., et al.
Published: (2007)
by: Lalitha, V., et al.
Published: (2007)
Similar Items
-
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012) -
Properties of Bayesian student model for INQPRO
by: Ting, Choo-Yee, et al.
Published: (2012) -
Affective music processing: Challenges
by: Phon-Amnuaisuk, Somnuk
Published: (2005) -
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)