Identification of Effective Network Features for Probing Attack Detection

被引:10
|
作者
Zargar, Gholam Reza [1 ]
Kabiri, Peyman [1 ]
机构
[1] Irans Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
D O I
10.1109/NDT.2009.5272124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. But not all the features are relevant ones and some of them are redundant and useless. This paper proposes and investigates identification of effective network features for Probing attack detection using PCA method to determine an optimal feature set. An appropriate feature set helps to build efficient decision model as well as a reduced feature set. Feature reduction will speed up the training and the testing process considerably. DARPA 1998 dataset was used in the experiments as the test data. Experimental results show a reduction in training and testing time while maintaining the detection accuracy within acceptable range.
引用
收藏
页码:392 / 397
页数:6
相关论文
共 50 条
  • [1] Online Network Attack Detection using Statistical Features
    Ratti, Ritesh
    Nandi, Sukumar
    Singh, Sanasam Ranbir
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [2] Identification of Effective Network Features to Detect Smurf Attacks
    Zargar, Gholam Reza
    Kabiri, Peyman.
    2009 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT: SCORED 2009, PROCEEDINGS, 2009, : 49 - 52
  • [4] Novel Class Probability Features for Optimizing Network Attack Detection With Machine Learning
    Raza, Ali
    Munir, Kashif
    Almutairi, Mubarak S.
    Sehar, Rukhshanda
    IEEE ACCESS, 2023, 11 : 98685 - 98694
  • [5] TRANSFERABLE DEEP CONVOLUTIONAL NEURAL NETWORK FEATURES FOR FINGERVEIN PRESENTATION ATTACK DETECTION
    Raghavendra, R.
    Venkatesh, Sushma
    Raja, Kiran B.
    Busch, Christoph
    2017 5TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF 2017), 2017,
  • [6] An effective recognition method for network attack
    Liu, Ying
    Gu, Wen-Xiang
    OPTIK, 2013, 124 (21): : 4823 - 4826
  • [7] Network Attack Detection and Mitigation
    Roy, Sangita
    Sairam, Ashok Singh
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 168 - 173
  • [8] On scalable attack detection in the network
    Kompella, Ramana Rao
    Singh, Sumeet
    Varghese, George
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) : 14 - 25
  • [9] Clock-Based Sender Identification and Attack Detection for Automotive CAN Network
    Zhou, Jia
    Xie, Guoqi
    Yu, Siyang
    Li, Renfa
    IEEE ACCESS, 2021, 9 : 2665 - 2679
  • [10] A Comparison of Features for Replay Attack Detection
    Xie, Zhifeng
    Zhang, Weibin
    Chen, Zhuxin
    Xu, Xiangmin
    2019 3RD INTERNATIONAL CONFERENCE ON MACHINE VISION AND INFORMATION TECHNOLOGY (CMVIT 2019), 2019, 1229