A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection
نویسندگان
چکیده
منابع مشابه
A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملMulti-task Feature Selection based Anomaly Detection
Network anomaly detection is still a vibrant research area. As the fast growth of network bandwidth and the tremendous traffic on the network, there arises an extremely challengeable question: How to efficiently and accurately detect the anomaly on multiple traffic? In multi-task learning, the traffic consisting of flows at different time periods is considered as a task. Multiple tasks at diffe...
متن کاملFeature Selection for SVM-Based Vascular Anomaly Detection
This work explores feature selection to improve the performance in the vascular anomaly detection domain. Starting from a previously defined classification framework based on Support Vector Machines (SVM), we attempt to determine features that improve classification performance and to define guidelines for feature selection. Three different strategies were used in the feature selection stage, w...
متن کاملFeature Selection for Effective Anomaly-Based Intrusion Detection
Intrusion Detection system (IDs) has become the main research focus in the area of information security. Most of the existing IDs use all the features in the network packet to evaluate and look for known intrusive patterns. Some of these features are irrelevant and redundant. The drawback of this approach is a lengthy detection process and degrading performance of an ID system. In this paper a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Sciences
سال: 2019
ISSN: 2076-3417
DOI: 10.3390/app9030437