期刊文献+

TCP/IP Feature Reduction in Intrusion Detection

TCP/IP Feature Reduction in Intrusion Detection
下载PDF
导出
摘要 Due to the amount of data that an IDS needs to examine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of reduced features better than primary features by experimental resuits. Due to the amount of data that an IDS needs to examine is very large, it is necessary to reduce the audit features and neglect the redundant features. Therefore, we investigated the performance to reduce TCP/IP features based on the decision tree rule-based statistical method(DTRS). Its main idea is to create n decision trees in n data subsets, extract the rules, work out the relatively important features in accordance with the frequency of use of different features and demonstrate the performance of reduced features better than primary features by experimental resuits.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期151-154,共4页 武汉大学学报(自然科学英文版)
基金 Supported by Natural Science Foundation of Hebei Prov-ince (F2004000133)
关键词 intrusion detection feature reduction decision tree data mining intrusion detection feature reduction decision tree data mining
  • 相关文献

参考文献9

  • 1Mukkamala S,,Sung A H,,Abraham A.Intrusion Detection Using an Ensemble of Intelligent Paradigms[].Journal of Network and Computer Appplications.2005
  • 2Richard L,,Haines J W,,Fried D J, et al.The 1999 DARPA Off-Line Intrusion Detection Evaluation[].Computer Networks.2000
  • 3Wenke L,,Fan Wei,,Miller M, et al.Toward Cost-Sensitive Modeling for Intrusion Detection Technical Report CUCS-002-00)[].Computer Science.2000
  • 4Mitchel T M,Zeng Huajun trnaslation.Machine Learning[]..2003
  • 5Chebrolu S,,Abraham A,,Thomas J P.Feature Deduction and Ensemble Design of Intrusion Detection System[].Computers and Security.2005
  • 6Heady R,,Luger G,,Maccabe A, et al.The Architecture of a Network Level Network Intrusion Detection System Tech- nical Report CS90-20)[]..1990
  • 7Wenke L,,Stolfo S J.A Framework for Constructing Features and Models for Intrusion Detection Systems[].ACM Transaction on Information and System Security.2000
  • 8Mukkamala S,,Sung A H.Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques[].International Journal of Digital Evidence.2003
  • 9Bierman E,,Cloete E,,Venter L M.A Comparison of Intru- sion Detection Systems[].Computers and Security.2001

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部