Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "8cf18e4a-0cbd-4a57-a245-523a9baed235"}, "_deposit": {"id": "4431", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4431"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4431", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Feature Selection in Hybrid Intrusion Detection System", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the enormous growth of computernetworks, network security is gaining increasingimportance. Therefore, the role of IntrusionDetection Systems (IDSs) is becoming moreimportant. There are many techniques availablefor intrusion detection. In this paper, a hybridintrusion detection method that integrates ananomaly detection model and a misuse detectionmodel using the one-class SVM and C4.5decision tree is proposed. Despite the inherentpotential of hybrid detection, there are manyissues that highly affect the performance of thehybrid systems such as detection rate, falsepositive rate, memory overhead, time overheadand so on. Moreover, most of the existing IDSsuse all of the features available in the dataset todetect the attack while some of the features areredundant. It is time-consuming and maydegrade the performance of IDSs. Therefore,rough set theory is used in the proposed hybridintrusion detection system to select the mostsignificant features. The experimentation isimplemented in ROSETTA and WEKA toolsusing NSL-KDD dataset."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Feature Selection in Hybrid Intrusion Detection System.pdf", "filesize": [{"value": "665 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 665000.0, "url": {"url": "https://meral.edu.mm/record/4431/files/Feature Selection in Hybrid Intrusion Detection System.pdf"}, "version_id": "cc3e8c54-a5c9-4bd1-b772-bf4e1113e299"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, Khin Khattar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2364"}, "item_title": "Feature Selection in Hybrid Intrusion Detection System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004431", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4431", "relation": {}, "relation_version_is_last": true, "title": ["Feature Selection in Hybrid Intrusion Detection System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Feature Selection in Hybrid Intrusion Detection System

http://hdl.handle.net/20.500.12678/0000004431
http://hdl.handle.net/20.500.12678/0000004431
d4ce1d1f-1b7b-4042-a903-f5b36a956086
8cf18e4a-0cbd-4a57-a245-523a9baed235
None
Preview
Name / File License Actions
Feature Feature Selection in Hybrid Intrusion Detection System.pdf (665 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:47:16.111967
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL