An Intrusion Detection System of Rough Set Theory Classification: Kyoto 2006+ Dataset
Aziz N.S., Sulaiman N.S., Nasir A., Yacob A., Subroto I.M.I., Mulyono S., Hashim N.N.M., Assegaf B.
Abstract
As telecommunication and information networks, which connect modern society through computers, smartphones, and other electronic devices, grow, so do security issues and cybercrime. The seriousness of cyberattacks in the context of network security has been highlighted by this rise in cybercrime. Simultaneously, machine learning has been thoroughly investigated for intrusion classification, with an emphasis on improving the accuracy of classifiers and the effectiveness of data mining models. This paper investigates the derivation of intrusion attack classification rules with Rough Set Theory (RST), a rule-based decision-making approach. To determine the efficacy of four different algorithms, including the Genetic Algorithm, experiments were carried out utilizing datasets that were made publicly available. When the Genetic Algorithm was used for rule construction in RST classification, the results were the best when compared to other rule generating techniques. Furthermore, this approach's capacity to precisely forecast all forms of attacks was shown when it was applied to a dataset of intrusion attacks that was made available to the public. Additionally, this methodology gives security professionals and developers useful information ahead of time, allowing them to take proactive measures when needed.
Cyber Attack Detection Dataset: A Review
Mohd Yusof N.N., Sulaiman N.S.
Feature Selection for Intrusion Detection Using Deep Reinforcement Learning
Alqaralleh N.A., Ghaffar A.M., Hassan M.A.
Ensemble Learning-Based Feature Selection Framework for Intrusion Detection Systems
Li H., Liu Q., Zhang X.
Unsupervised Feature Selection for Network Intrusion Detection Using Autoencoders
Chen B., Zhang Q.
Genetic Algorithm and Support Vector Machine-Based Feature Selection for Intrusion Detection
Arif M.S., Khan A.R., Kim J.Y.
Hybrid Feature Selection Approach for Intrusion Detection Using Deep Learning and Feature Selection Algorithms
Li Y., Wang C., Zhang S.
Rough Set Theory for Intrusion Detection: A Comprehensive Review
Chien R.B.C.
Network Intrusion Detection Systems: A Survey
Ahmed N., Hu S.H., Khan M.M.S.
Cooperation of intelligent honeypots to detect unknown malicious codes
Okabe Y., Song J., Takakura H.
No Title