Swarm intelligence
Rough Sets: Theoretical Aspects of Reasoning about Data
Rough Sets: Theoretical Aspects of Reasoning about Data
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Rough set methods in feature selection and recognition
Pattern Recognition Letters - Special issue: Rough sets, pattern recognition and data mining
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
Feature selection based on rough sets and particle swarm optimization
Pattern Recognition Letters
Fuzzy-rough data reduction with ant colony optimization
Fuzzy Sets and Systems
Kernel PCA based network intrusion feature extraction and detection using SVM
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Feature selection with particle swarms
CIS'04 Proceedings of the First international conference on Computational and Information Science
The feature selection and intrusion detection problems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Intrusion detection system based on multi-class SVM
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
An adaptive network intrusion detection method based on PCA and support vector machines
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Using attack-specific feature subsets for network intrusion detection
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Similarity-based classification using specific features in network intrusion detection
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
Compact classification of optimized Boolean reasoning with Particle Swarm Optimization
Intelligent Data Analysis
Hi-index | 0.00 |
Most of the existing IDS use all the features in network packet to evaluate and look for known intrusive patterns. Some of these features are irrelevant and redundant. The drawback to this approach is a lengthy detection process. In real-time environment this may degrade the performance of an IDS. Thus, feature selection is required to address this issue. In this paper, we use wrapper approach where we integrate Rough Set and Particle Swarm to form a 2-tier structure of feature selection process. Experimental results show that feature subset proposed by Rough-DPSO gives better representation of data and they are robust.