Linh Le Thi Trang, Van-Truong Nguyen, Quang-Huy Dinh, Trong-Minh Hoang
{"title":"攻击检测问题中的数据降维方法比较","authors":"Linh Le Thi Trang, Van-Truong Nguyen, Quang-Huy Dinh, Trong-Minh Hoang","doi":"10.1109/atc52653.2021.9598247","DOIUrl":null,"url":null,"abstract":"Data dimension reduction issue is an important problem in the data pre-processing stage of data intelligent computing systems. The performance of data dimension reduction methods not only ensure compatibility with machine learning techniques, but also improve data processing efficiency. However, the performance of a dimensional reduction processing method in a data set is always an open challenging issue since it is closely tied to the data features. This paper presents the results of comparing the performance of several approaches in two common approaches on the UNSW-NB 15 data set for attack detection. Our experimental results show that RF-MLP method is very effective for deploying IDSs against DOS attacks.","PeriodicalId":196900,"journal":{"name":"2021 International Conference on Advanced Technologies for Communications (ATC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparison of Data Dimension Reduction Methods in The Problem of Detecting Attacks\",\"authors\":\"Linh Le Thi Trang, Van-Truong Nguyen, Quang-Huy Dinh, Trong-Minh Hoang\",\"doi\":\"10.1109/atc52653.2021.9598247\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data dimension reduction issue is an important problem in the data pre-processing stage of data intelligent computing systems. The performance of data dimension reduction methods not only ensure compatibility with machine learning techniques, but also improve data processing efficiency. However, the performance of a dimensional reduction processing method in a data set is always an open challenging issue since it is closely tied to the data features. This paper presents the results of comparing the performance of several approaches in two common approaches on the UNSW-NB 15 data set for attack detection. Our experimental results show that RF-MLP method is very effective for deploying IDSs against DOS attacks.\",\"PeriodicalId\":196900,\"journal\":{\"name\":\"2021 International Conference on Advanced Technologies for Communications (ATC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Advanced Technologies for Communications (ATC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/atc52653.2021.9598247\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/atc52653.2021.9598247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of Data Dimension Reduction Methods in The Problem of Detecting Attacks
Data dimension reduction issue is an important problem in the data pre-processing stage of data intelligent computing systems. The performance of data dimension reduction methods not only ensure compatibility with machine learning techniques, but also improve data processing efficiency. However, the performance of a dimensional reduction processing method in a data set is always an open challenging issue since it is closely tied to the data features. This paper presents the results of comparing the performance of several approaches in two common approaches on the UNSW-NB 15 data set for attack detection. Our experimental results show that RF-MLP method is very effective for deploying IDSs against DOS attacks.