IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Feature Extraction Methods for Intrusion Detection Systems

Feature Extraction Methods for Intrusion Detection Systems
View Sample PDF
Author(s): Hai Thanh Nguyen (Gjøvik University College, Norway), Katrin Franke (Gjøvik University College, Norway)and Slobodan Petrovic (Gjøvik University College, Norway)
Copyright: 2013
Pages: 29
Source title: Image Processing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-3994-2.ch054

Purchase

View Feature Extraction Methods for Intrusion Detection Systems on the publisher's website for pricing and purchasing information.

Abstract

Intrusion Detection Systems (IDSs) have become an important security tool for managing risk and an indispensable part of overall security architecture. An IDS is considered as a pattern recognition system, in which feature extraction is an important pre-processing step. The feature extraction process consists of feature construction and feature selection . The quality of the feature construction and feature selection algorithms is one of the most important factors that affects the effectiveness of an IDS. Achieving reduction of the number of relevant traffic features without negative effect on classification accuracy is a goal that largely improves the overall effectiveness of the IDS. Most of the feature construction as well as feature selection works in intrusion detection practice is still carried through manually by utilizing domain knowledge. For automatic feature construction and feature selection, the filter, wrapper, and embedded methods from machine learning are frequently applied. This chapter provides an overview of various existing feature construction and feature selection methods for intrusion detection systems. A comparison between those feature selection methods is performed in the experimental part.

Related Content

Aswathy Ravikumar, Harini Sriraman. © 2023. 18 pages.
Ezhilarasie R., Aishwarya N., Subramani V., Umamakeswari A.. © 2023. 10 pages.
Sangeetha J.. © 2023. 13 pages.
Manivannan Doraipandian, Sriram J., Yathishan D., Palanivel S.. © 2023. 14 pages.
T. Kavitha, Malini S., Senbagavalli G.. © 2023. 36 pages.
Uma K. V., Aakash V., Deisy C.. © 2023. 23 pages.
Alageswaran Ramaiah, Arun K. S., Yathishan D., Sriram J., Palanivel S.. © 2023. 17 pages.
Body Bottom