Please use this identifier to cite or link to this item:
https://ir.swu.ac.th/jspui/handle/123456789/12517
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pattawaro A. | |
dc.contributor.author | Polprasert C. | |
dc.date.accessioned | 2021-04-05T03:03:56Z | - |
dc.date.available | 2021-04-05T03:03:56Z | - |
dc.date.issued | 2019 | |
dc.identifier.issn | 21570981 | |
dc.identifier.other | 2-s2.0-85061932044 | |
dc.identifier.uri | https://ir.swu.ac.th/jspui/handle/123456789/12517 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061932044&doi=10.1109%2fICTKE.2018.8612331&partnerID=40&md5=762291db16898860c4c0e7106ea59875 | |
dc.description.abstract | In this paper, we propose an anomaly-based network intrusion detection system based on a combination of feature selection, K-Means clustering and XGBoost classification model. We test the performance of our proposed system over NSL-KDD dataset using KDDTest + dataset. A feature selection method based on attribute ratio (AR) [14] is applied to construct a reduced feature subset of NSL-KDD dataset. After applying K-Means clustering, hyperparameter tuning of each classification model corresponding to each cluster is implemented. Using only 2 clusters, our proposed model obtains accuracy equal to 84.41% with detection rate equal to 86.36% and false alarm rate equal to 18.20% for KDDTest + dataset. The performance of our proposed model outperforms those obtained using the recurrent neural network (RNN)-based deep neural network and other tree-based classifiers. In addition, due to feature selection, our proposed model employs only 75 out of 122 features (61.47%) to achieve this level of performance comparable to those using full number of features to train the model. © 2018 IEEE. | |
dc.subject | Computer crime | |
dc.subject | Deep neural networks | |
dc.subject | Intrusion detection | |
dc.subject | K-means clustering | |
dc.subject | Knowledge engineering | |
dc.subject | Network security | |
dc.subject | Recurrent neural networks | |
dc.subject | Statistical tests | |
dc.subject | Classification models | |
dc.subject | False alarm rate | |
dc.subject | Feature selection methods | |
dc.subject | Hybrid clustering | |
dc.subject | Hybrid machine learning | |
dc.subject | Network intrusion detection systems | |
dc.subject | NSL-KDD | |
dc.subject | Recurrent neural network (RNN) | |
dc.subject | Feature extraction | |
dc.title | Anomaly-Based Network Intrusion Detection System through Feature Selection and Hybrid Machine Learning Technique | |
dc.type | Conference Paper | |
dc.rights.holder | Scopus | |
dc.identifier.bibliograpycitation | International Conference on ICT and Knowledge Engineering. Vol 2018-November, (2019), p.64-69 | |
dc.identifier.doi | 10.1109/ICTKE.2018.8612331 | |
Appears in Collections: | Scopus 1983-2021 |
Files in This Item:
There are no files associated with this item.
Items in SWU repository are protected by copyright, with all rights reserved, unless otherwise indicated.