Different Feature Selection Methods Performance Analysis for Intrusion Detection

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the current time frame, the area of safety has become an indispensable and essential issue in network, data, and information security. Profoundly, confidential data from different affiliations are accessible through the network. Shielding that data from unapproved clients or raiders requires a robust security framework. They intrude on acknowledgment structure assumes a significant part in the security of PC networks. An interruption discovery structure gathers and examines information from different locales inside a PC or network to recognize conceivable security chances that fuse hazards both outer and inner to the affiliation. The interruption acknowledgment structure deals with many data containing a few excess and dull features, expanding the executives’ time and low distinguishing proof rate. Consequently, the assurance to incorporate assumes a massive part in distinguishing the break. There are a few systems for picking consideration proposed recorded as a hard copy by different essayists. This article presents a comparative assessment of different component assurance techniques in the KDDCUP’99 reference dataset. It assesses their exhibition as far as disclosure rate, root mean square mistake, and calculation time.

Cite

CITATION STYLE

APA

Sindhura, S., Phani Praveen, S., Madhuri, A., & Swapna, D. (2022). Different Feature Selection Methods Performance Analysis for Intrusion Detection. In Smart Innovation, Systems and Technologies (Vol. 283, pp. 523–531). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-9705-0_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free