{"title":"校正后的kdd数据集的特征选择","authors":"S. Zargari, D. Voorhis","doi":"10.1109/EIDWT.2012.10","DOIUrl":null,"url":null,"abstract":"Automation in anomaly detection, which deals with detecting of unknown attacks in the network traffic, has been the focus of research by using data mining techniques in recent years. This study attempts to explore significant features (curse of high dimensionality) in intrusion detection in order to be applied in data mining techniques. Therefore, the existing irrelevant and redundant features are deleted from the dataset resulting faster training and testing process, less resource consumption as well as maintaining high detection rates. The findings were tested on the NSL-KDD datasets (anomaly intrusion datasets) in order to confirm the outcomes.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":"{\"title\":\"Feature Selection in the Corrected KDD-dataset\",\"authors\":\"S. Zargari, D. Voorhis\",\"doi\":\"10.1109/EIDWT.2012.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Automation in anomaly detection, which deals with detecting of unknown attacks in the network traffic, has been the focus of research by using data mining techniques in recent years. This study attempts to explore significant features (curse of high dimensionality) in intrusion detection in order to be applied in data mining techniques. Therefore, the existing irrelevant and redundant features are deleted from the dataset resulting faster training and testing process, less resource consumption as well as maintaining high detection rates. The findings were tested on the NSL-KDD datasets (anomaly intrusion datasets) in order to confirm the outcomes.\",\"PeriodicalId\":222292,\"journal\":{\"name\":\"2012 Third International Conference on Emerging Intelligent Data and Web Technologies\",\"volume\":\"107 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"33\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Emerging Intelligent Data and Web Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIDWT.2012.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIDWT.2012.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automation in anomaly detection, which deals with detecting of unknown attacks in the network traffic, has been the focus of research by using data mining techniques in recent years. This study attempts to explore significant features (curse of high dimensionality) in intrusion detection in order to be applied in data mining techniques. Therefore, the existing irrelevant and redundant features are deleted from the dataset resulting faster training and testing process, less resource consumption as well as maintaining high detection rates. The findings were tested on the NSL-KDD datasets (anomaly intrusion datasets) in order to confirm the outcomes.