Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems.
Adam LehaviSeongtae KimPublished in: ICMLA (2022)
Keyphrases
- reduction method
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- computer networks
- network traffic
- computer security
- selection algorithm
- network intrusion detection
- distributed intrusion detection
- computer systems
- intrusion prevention
- image features
- data mining
- knowledge based systems
- network intrusion detection systems
- malicious activities
- attack detection
- real world
- data mining techniques
- machine learning
- neural network
- databases
- training data
- alert correlation
- feature vectors
- feature set
- data sets