Abstract
IDS helps to overcome the network attack by taking appropriate preventive measures. The data mining method has good adaptability to new attack types; however, it consumes much time for high dimensional data. Therefore, the system needs a reduction of that high dimension. In this paper, we use a correlation approach of the attribute to evaluate those high dimensional data. To achieve a better environment, we propose a cut-off value of correlation to select some best features to use in the classification process. The best cut-off value in our experiment is 0.2 in RF classification that reaches 99.36% accuracy. The selection feature can reduce the time consumed in the running system.
| Original language | English |
|---|---|
| Title of host publication | Proceeding - ICoSTA 2020 |
| Subtitle of host publication | 2020 International Conference on Smart Technology and Applications: Empowering Industrial IoT by Implementing Green Technology for Sustainable Development |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781728130835 |
| DOIs | |
| Publication status | Published - Feb 2020 |
| Event | 2020 International Conference on Smart Technology and Applications, ICoSTA 2020 - Surabaya, Indonesia Duration: 20 Feb 2020 → … |
Publication series
| Name | Proceeding - ICoSTA 2020: 2020 International Conference on Smart Technology and Applications: Empowering Industrial IoT by Implementing Green Technology for Sustainable Development |
|---|
Conference
| Conference | 2020 International Conference on Smart Technology and Applications, ICoSTA 2020 |
|---|---|
| Country/Territory | Indonesia |
| City | Surabaya |
| Period | 20/02/20 → … |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- Pearson's correlation
- feature
- intrusion detection system
- network security
- selection
Fingerprint
Dive into the research topics of 'Pearson Correlation Attribute Evaluation-based Feature Selection for Intrusion Detection System'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver