An Empirical Investigation of Attribute Selection Techniques based on Shannon, Renyi and Tsallis Entropies for Network Intrusion Detection

Provided by: Scientifantastic Apps
Topic: Security
Format: PDF
Intrusion detection systems of computer network perform their detection capabilities by monitoring a set of attributes from network traffic. Since some attributes may be irrelevant, redundant or even noisy, their usage can decrease the intrusion detection efficiency as well as increase the set of attributes. In this paper, selecting optimal attributes is a difficult task considering that the set of all attributes can assume a huge variety of data formats (for example: symbol set, e.g. binary, alphanumeric, real number, etc., types, length and among others).

Find By Topic