{"title":"评估用于攻击检测的进化包装器的不同度量配置","authors":"Javier Maldonado, M. Riff","doi":"10.1109/ICTAI.2019.00187","DOIUrl":null,"url":null,"abstract":"Detecting various types of attacks is a major problem in cybersecurity. In this paper, we show different configurations of an evolutionary wrapper algorithm for selecting features to classify attacks using a decision tree. We use two metrics for the evaluation function and evolutionary operator acceptance criteria. As part of our experiments, we interchange them and test the effect on the classification quality. Results show that the algorithm is able to guide the classification to accomplish different goals.","PeriodicalId":346657,"journal":{"name":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection\",\"authors\":\"Javier Maldonado, M. Riff\",\"doi\":\"10.1109/ICTAI.2019.00187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detecting various types of attacks is a major problem in cybersecurity. In this paper, we show different configurations of an evolutionary wrapper algorithm for selecting features to classify attacks using a decision tree. We use two metrics for the evaluation function and evolutionary operator acceptance criteria. As part of our experiments, we interchange them and test the effect on the classification quality. Results show that the algorithm is able to guide the classification to accomplish different goals.\",\"PeriodicalId\":346657,\"journal\":{\"name\":\"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAI.2019.00187\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAI.2019.00187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection
Detecting various types of attacks is a major problem in cybersecurity. In this paper, we show different configurations of an evolutionary wrapper algorithm for selecting features to classify attacks using a decision tree. We use two metrics for the evaluation function and evolutionary operator acceptance criteria. As part of our experiments, we interchange them and test the effect on the classification quality. Results show that the algorithm is able to guide the classification to accomplish different goals.