{"title":"基于欧几里德距离和余弦相似度的入侵检测模型特征选择","authors":"A. Suebsing, N. Hiransakolwong","doi":"10.1109/ACIIDS.2009.23","DOIUrl":null,"url":null,"abstract":"Nowadays, data mining plays an important role in many sciences, including intrusion detection system (IDS). However, one of the essential steps of data mining is feature selection, because feature selection can help improve the efficiency of prediction rate. The previous researches, selecting features in the raw data, are difficult to implement. This paper proposes feature selection based on Euclidean Distance and Cosine Similarity which ease to implement. The experiment results show that the proposed approach can select a robust feature subset to build models for detecting known and unknown attack patterns of computer network connections. This proposed approach can improve the performance of a true positive intrusion detection rate.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection Model\",\"authors\":\"A. Suebsing, N. Hiransakolwong\",\"doi\":\"10.1109/ACIIDS.2009.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, data mining plays an important role in many sciences, including intrusion detection system (IDS). However, one of the essential steps of data mining is feature selection, because feature selection can help improve the efficiency of prediction rate. The previous researches, selecting features in the raw data, are difficult to implement. This paper proposes feature selection based on Euclidean Distance and Cosine Similarity which ease to implement. The experiment results show that the proposed approach can select a robust feature subset to build models for detecting known and unknown attack patterns of computer network connections. This proposed approach can improve the performance of a true positive intrusion detection rate.\",\"PeriodicalId\":275776,\"journal\":{\"name\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 First Asian Conference on Intelligent Information and Database Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIIDS.2009.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 First Asian Conference on Intelligent Information and Database Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIIDS.2009.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection Model
Nowadays, data mining plays an important role in many sciences, including intrusion detection system (IDS). However, one of the essential steps of data mining is feature selection, because feature selection can help improve the efficiency of prediction rate. The previous researches, selecting features in the raw data, are difficult to implement. This paper proposes feature selection based on Euclidean Distance and Cosine Similarity which ease to implement. The experiment results show that the proposed approach can select a robust feature subset to build models for detecting known and unknown attack patterns of computer network connections. This proposed approach can improve the performance of a true positive intrusion detection rate.