70
Views
16
CrossRef citations to date
0
Altmetric
Articles

An ensemble feature reduction method for web-attack detection

&

References

  • Fong, Elizabeth, and Vadim Okun. “Web application scanners: definitions and functions.” 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07). IEEE, 2007.
  • Folorunso, Olusegun, Femi Emmanuel Ayo, and Y. E. Babalola. “Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach.” Journal of Information Privacy and Security 12.4 (2016): 181-196. doi: 10.1080/15536548.2016.1257680
  • Salih, Azar Abid, and Maiwan Bahjat Abdulrazaq. “Combining Best Features Selection Using Three Classifiers in Intrusion Detection System.” 2019 International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2019.
  • Divyasree, T. H., and K. K. Sherly. “A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach.” Procedia computer science 143 (2018): 442-449. doi: 10.1016/j.procs.2018.10.416
  • Salo, Fadi, Ali Bou Nassif, and Aleksander Essex. “Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection.” Computer Networks 148 (2019): 164-175. doi: 10.1016/j.comnet.2018.11.010
  • Manzoor, Ishfaq, and Neeraj Kumar. “A feature reduced intrusion detection system using ANN classifier.” Expert Systems with Applications 88 (2017): 249-257. doi: 10.1016/j.eswa.2017.07.005
  • Yulianto, Arif, Parman Sukarno, and Novian Anggis Suwastika. “Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset.” Journal of Physics: Conference Series. Vol. 1192. No. 1. IOP Publishing, 2019.
  • Sornsuwit, Ployphan, and Saichon Jaiyen. “A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting.” Applied Artificial Intelligence 33.5 (2019): 462-482. doi: 10.1080/08839514.2019.1582861
  • Zheng, Jun, and Yujie Zhou. “Intrusion detection algorithm based on improved principal component analysis.” Journal of Discrete Mathematical Sciences and Cryptography 20.5 (2017): 1007-1016. doi: 10.1080/09720529.2017.1310979
  • Velliangiri, S. “A hybrid BGWO with KPCA for intrusion detection.” Journal of Experimental & Theoretical Artificial Intelligence (2019): 1-16.
  • Kumar, Ankit, et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 499-507. doi: 10.1080/09720529.2019.1637154
  • Sharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.” ICISSP. 2018.
  • Singh Panwar, Shailesh, Y. P. Raiwani, and Lokesh Singh Panwar. “Evaluation of Network Intrusion Detection with Features Selection and Machine Learning Algorithms on CICIDS-2017 Dataset.” Available at SSRN 3394103 (2019).
  • Khan, Farrukh Aslam, et al. “A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.” IEEE Access 7 (2019): 30373-30385. doi: 10.1109/ACCESS.2019.2899721

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.