A FEATURE SELECTION TECHNIQUE FOR INTRUSION DETECTION SYSTEM BASED ON IWD AND ACO
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
S. Singh and S. Silakari, "A survey of cyber-attack detection systems," International Journal of Computer Science and Network Security 9.5 (2009): 1-10.
K. El-Khatib, "Impact of feature reduction on the efficiency of wireless intrusion detection systems," IEEE TRANSACTIONS on parallel and distributed systems 21.8 (2010): 1143-1149.
M. H. Aghdam, and P. Kabiri, "Feature Selection for Intrusion Detection System Using Ant Colony Optimization," IJ Network Security 18.3 (2016): 420-432.
M.A. Ambusaidi , X. He, , P. Nanda, and Z. Tan, “Building an intrusion detection system using a filter-based feature selection algorithm,†IEEE transactions on computers, 65(10), pp.2986-2998..
S. O. Al-mamory and F. S. Jassim, (2015), “On the designing of two grains levels network intrusion detection system,†Karbala International Journal of Modern Science, 1(1), 15-25.
S. Mukkamala and A. Sung, (2003), “Feature selection for intrusion detection with neural networks and support vector machines,†Transportation Research Record: Journal of the Transportation Research Board, (1822), 33-39.
S. Ganapathy, K. Kulothungan, , S. Muthurajkumar, M. Vijayalakshmi, P. Yogesh, A. Kannan, (2013), “Intelligent feature selection and classification techniques for intrusion detection in networks: a survey,†EURASIP Journal on Wireless Communications and Networking, 2013(1), 271.
R. C., Chen, K. F. Cheng, Y. H. Chen, , and C. F. Hsieh, (2009, April), “Using rough set and support vector machine for network intrusion detection system,†In Intelligent Information and Database Systems, 2009. ACIIDS 2009. First Asian Conference on (pp. 465-470). IEEE.
F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, (2010, November), “Principle components analysis and support vector machine based intrusion detection system,†In Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on (pp. 363-367). IEEE.
B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, , A. Maralani, M. Eslami, M. J. Golkar and A. Ebrahimi, (2016), “A hybrid method consisting of GA and SVM for intrusion detection system,†Neural Computing and Applications, 27(6), 1669-1676.
H. Shah-Hosseini, (2009), “Optimization with the nature-inspired intelligent water drops algorithm,†In Evolutionary computation. InTech.
B. O. Alijla, C. P. Lim, A. T. Khader and M. A. Al-Betar, (2013, March), “Intelligent Water Drops Algorithm for Rough Set Feature Selection,†In ACIIDS (2) (pp. 356-365)..
D. Martens, B. Baesens and T. Fawcett, (2011), “Editorial survey: swarm intelligence for data mining,†Machine Learning, 82(1), 1-42.
C. F. Tsai, Y. F. Hsu, , C. Y. Lin, and W. Y. Lin, (2009), “Intrusion detection by machine learning: A review,†Expert Systems with Applications, 36(10), 11994-12000.
S. Singh and S. Silakari, (2009), “A survey of cyber-attack detection systems,†International Journal of Computer Science and Network Security, 9(5), 1-10.
F. Iglesias and T. Zseby, (2015), “Analysis of network traffic features for anomaly detection,†Machine Learning, 101(1-3), 59-84..
F. Haneef, G. R. Kushwaha, and A. K. Dubey, (2011, June), “Analysis with Data Mining and Ant Colony Algorithm for Implementing of Object Pool Optimization,†In Communication Systems and Network Technologies (CSNT), 2011 International Conference on (pp. 313-317). IEEE.
N. Acharya, and S. Singh, (2017), “An IWD-based feature selection method for intrusion detection system,†Soft Computing, 1-10.
I. Ahmad, M. Hussain, A. Alghamdi and A. Alelaiwi, (2014), “Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components,†Neural Computing and Applications, 24(7-8), 1671-1682.