Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection.
Rania A. GhazyEl-Sayed M. El-RabaieMoawad I. DessoukyNawal A. El-FishawyFathi E. Abd El-SamiePublished in: Wirel. Pers. Commun. (2020)
Keyphrases
- intrusion detection
- feature selection
- feature subset
- feature ranking
- intrusion detection system
- anomaly detection
- feature selection algorithms
- feature set
- support vector
- classification accuracy
- network traffic
- feature space
- network intrusion detection
- network intrusion
- network security
- naive bayes
- high detection rate
- text categorization
- computer security
- ranking algorithm
- data mining
- text classification
- support vector machine
- information security
- artificial immune
- alert correlation
- training data
- network intrusions
- intrusion prevention
- machine learning
- cyber security
- network attacks
- ensemble methods
- unsupervised learning
- information systems
- fraud detection
- detection algorithm
- data mining techniques
- multi class
- knowledge discovery
- decision trees
- detecting anomalous
- learning algorithm