Linh Le Thi Trang, Van-Truong Nguyen, Quang-Huy Dinh, Trong-Minh Hoang
{"title":"Comparison of Data Dimension Reduction Methods in The Problem of Detecting Attacks","authors":"Linh Le Thi Trang, Van-Truong Nguyen, Quang-Huy Dinh, Trong-Minh Hoang","doi":"10.1109/atc52653.2021.9598247","DOIUrl":null,"url":null,"abstract":"Data dimension reduction issue is an important problem in the data pre-processing stage of data intelligent computing systems. The performance of data dimension reduction methods not only ensure compatibility with machine learning techniques, but also improve data processing efficiency. However, the performance of a dimensional reduction processing method in a data set is always an open challenging issue since it is closely tied to the data features. This paper presents the results of comparing the performance of several approaches in two common approaches on the UNSW-NB 15 data set for attack detection. Our experimental results show that RF-MLP method is very effective for deploying IDSs against DOS attacks.","PeriodicalId":196900,"journal":{"name":"2021 International Conference on Advanced Technologies for Communications (ATC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/atc52653.2021.9598247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Data dimension reduction issue is an important problem in the data pre-processing stage of data intelligent computing systems. The performance of data dimension reduction methods not only ensure compatibility with machine learning techniques, but also improve data processing efficiency. However, the performance of a dimensional reduction processing method in a data set is always an open challenging issue since it is closely tied to the data features. This paper presents the results of comparing the performance of several approaches in two common approaches on the UNSW-NB 15 data set for attack detection. Our experimental results show that RF-MLP method is very effective for deploying IDSs against DOS attacks.