Online Feature Ranking for Intrusion Detection Systems

03/01/2018
by   Buse Gul Atli, et al.
0

Many current approaches to the design of intrusion detec- tion systems apply feature selection in a static, non-adaptive fashion. These methods often neglect the dynamic nature of network data which requires to use adaptive feature selection techniques. In this paper, we present a simple technique based on incremental learning of support vector machines in order to rank the features in real time within a streaming model for network data. Some illustrative numerical experiments with two popular benchmark datasets show that our approach al- lows to adapt to the changes in normal network behaviour and novel attack patterns which have not been experienced before.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/28/2021

Feature selection for intrusion detection systems

In this paper, we analyze existing feature selection methods to identify...
research
09/24/2020

A Hybrid Intrusion Detection with Decision Tree for Feature Selection

Due to the size and nature of intrusion detection datasets, intrusion de...
research
05/16/2019

Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework

Intrusion Detection Systems (IDS) are developed to protect the network b...
research
07/21/2023

Identifying Relevant Features of CSE-CIC-IDS2018 Dataset for the Development of an Intrusion Detection System

Intrusion detection systems (IDSs) are essential elements of IT systems....
research
12/27/2017

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

Despite the great developments in information technology, particularly t...
research
08/17/2020

Revisiting the Application of Feature Selection Methods to Speech Imagery BCI Datasets

Brain-computer interface (BCI) aims to establish and improve human and c...
research
03/21/2016

Static and Dynamic Feature Selection in Morphosyntactic Analyzers

We study the use of greedy feature selection methods for morphosyntactic...

Please sign up or login with your details

Forgot password? Click here to reset