Feature Subset Selection in Intrusion Detection: Using Soft Computing Techniques

-15% su kodu: ENG15
96,65 
Įprasta kaina: 113,70 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
96,65 
Įprasta kaina: 113,70 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
2025-02-28 113.7000 InStock
Nemokamas pristatymas į paštomatus per 11-15 darbo dienų užsakymams nuo 10,00 

Knygos aprašymas

Intrusions on computer network systems are major security issues these days. Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. PCA has been employed to transform raw features into principal features space and select the features based on their sensitivity. This research applied a GA to search the principal feature space that offers a subset of features with optimal sensitivity. Based on the selected features, the classification is performed. The SVM and MLP are used for classification. This research work uses the KDD dataset. The performance of this approach was analyzed and compared with existing approaches. The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Informacija

Autorius: Iftikhar Ahmad
Leidėjas: LAP LAMBERT Academic Publishing
Išleidimo metai: 2012
Knygos puslapių skaičius: 220
ISBN-10: 384734496X
ISBN-13: 9783847344964
Formatas: 220 x 150 x 14 mm. Knyga minkštu viršeliu
Kalba: Anglų

Pirkėjų atsiliepimai

Parašykite atsiliepimą apie „Feature Subset Selection in Intrusion Detection: Using Soft Computing Techniques“

Būtina įvertinti prekę

Goodreads reviews for „Feature Subset Selection in Intrusion Detection: Using Soft Computing Techniques“