[vc_empty_space][vc_empty_space]
Vitality based feature selection for intrusion detection
Jupriyadia, Kistijantoro A.I.a
a School of Electrical Engineering and Informatics, Bandung Institute of Technology, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.Intrusion detection system is the process to monitor network traffic to detect possible attacks. In recent time, network traffic increasing rapidly. There are plenty of research today focused on feature selection or reduction, as some of the features are irrelevant and degrade the performance of an intrusion detection system. By eliminating some of features, we can improve the performance of classification algorithm. In this paper, we evaluate the performance of feature selection methods, such as Correlation Based Feature Selection (CFS), Information Gain (IG), Gain Ratio (GR), Feature Vitality Based Reduction Method (FVBRM). We propose a modification to FVBRM by changing the parameter True Positives Rate (TPR) into False Positives Rate (FPR) and by applying naïve bayes classifier on reduced dataset to measure the result of our feature selection method. The results of modified FVBRM indicate that selected attributes provide better performance for intrusion detection system.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Bayes Classifier,Better performance,Classification algorithm,Correlation based feature selections (CFS),Feature selection methods,FVBRM,Information gain,Intrusion Detection Systems[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]feature selection,FVBRM,intrusion detection system,network security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICAICTA.2014.7005921[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]