{"created":"2020-09-01T14:47:10.348880+00:00","id":4431,"links":{},"metadata":{"_buckets":{"deposit":"8cf18e4a-0cbd-4a57-a245-523a9baed235"},"_deposit":{"id":"4431","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4431"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4431","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Feature Selection in Hybrid Intrusion Detection System","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"With the enormous growth of computernetworks, network security is gaining increasingimportance. Therefore, the role of IntrusionDetection Systems (IDSs) is becoming moreimportant. There are many techniques availablefor intrusion detection. In this paper, a hybridintrusion detection method that integrates ananomaly detection model and a misuse detectionmodel using the one-class SVM and C4.5decision tree is proposed. Despite the inherentpotential of hybrid detection, there are manyissues that highly affect the performance of thehybrid systems such as detection rate, falsepositive rate, memory overhead, time overheadand so on. Moreover, most of the existing IDSsuse all of the features available in the dataset todetect the attack while some of the features areredundant. It is time-consuming and maydegrade the performance of IDSs. Therefore,rough set theory is used in the proposed hybridintrusion detection system to select the mostsignificant features. The experimentation isimplemented in ROSETTA and WEKA toolsusing NSL-KDD dataset."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-10-25"}],"displaytype":"preview","filename":"Feature Selection in Hybrid Intrusion Detection System.pdf","filesize":[{"value":"665 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4431/files/Feature Selection in Hybrid Intrusion Detection System.pdf"},"version_id":"cc3e8c54-a5c9-4bd1-b772-bf4e1113e299"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myint, Khin Khattar"},{"subitem_authors_fullname":"Kham, Nang Saing Moon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2364"},"item_title":"Feature Selection in Hybrid Intrusion Detection System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-10-25","publish_status":"0","recid":"4431","relation_version_is_last":true,"title":["Feature Selection in Hybrid Intrusion Detection System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:54:59.079468+00:00"}