An Empirical Investigation of Attribute Selection Techniques based on Shannon, Renyi and Tsallis Entropies for Network Intrusion Detection

Intrusion detection systems of computer network perform their detection capabilities by monitoring a set of attributes from network traffic. Since some attributes may be irrelevant, redundant or even noisy, their usage can decrease the intrusion detection efficiency as well as increase the set of attributes. In this paper, selecting optimal attributes is a difficult task considering that the set of all attributes can assume a huge variety of data formats (for example: symbol set, e.g. binary, alphanumeric, real number, etc., types, length and among others).

Provided by: Scientifantastic Apps Topic: Security Date Added: Sep 2012 Format: PDF

Find By Topic