Feature selection using rough set in intrusion detection
Most of existing Intrusion Detection Systems use all data features to detect an intrusion. Very little works address the importance of having a small feature subset in designing an efficient intrusion detection system. Some features are redundant and some contribute little to the intrusion detection...
| Main Authors: | Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3228/ http://eprints.utm.my/3228/1/TENCON_2006.pdf |
Similar Items
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020)
by: Aljanabi, Mohammad, et al.
Published: (2020)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Rough sets theory for travel demand analysis in Malaysia
by: Wong, Jenn Hwee
Published: (2008)
by: Wong, Jenn Hwee
Published: (2008)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
Similar Items
-
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008) -
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007) -
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)