• español
    • English
  • Login
  • español 
    • español
    • English

UniversidaddeCádiz

Área de Biblioteca, Archivo y Publicaciones
Comunidades y colecciones
Ver ítem 
  •   RODIN Principal
  • Producción Científica
  • Artículos Científicos
  • Ver ítem
  •   RODIN Principal
  • Producción Científica
  • Artículos Científicos
  • Ver ítem
JavaScript is disabled for your browser. Some features of this site may not work without it.

Evaluating the impact of different Feature as a Counter data aggregation approaches on the performance of NIDSs and their selected features

Thumbnail
Identificadores

URI: http://hdl.handle.net/10498/33708

DOI: 10.1093/jigpal/jzae007

ISSN: 1368-9894

ISSN: 1367-0751

Ficheros
OA_2024_0488.pdf (695.8Kb)
Estadísticas
Ver estadísticas
Métricas y Citas
 
Compartir
Exportar a
Exportar a MendeleyRefworksEndNoteBibTexRIS
Metadatos
Mostrar el registro completo del ítem
Autor/es
Magán Carrión, Roberto; Urdal Muñoz, Daniel; Díaz Cano, IgnacioAutoridad UCA; Dorronsoro Díaz, BernabéAutoridad UCA
Fecha
2024
Departamento/s
Ingeniería Informática
Fuente
Logic Journal of the IGPL - 2024, Vol. 32 n. 2 pp. 263-280
Resumen
There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw data onto derived one suitable for ML models. In this work, we study the effects of applying one such FE technique in different ways on the performance of two ML models (linear and non-linear) and their selected features. This is the Feature as a Counter approach. The derived observations are computed from either with the same number of raw samples, (batch-based approaches) or by aggregating them by time intervals (timestamp-based approach). Results show that there is no significant differences between the proposed approaches neither in the performance of the models nor in the selected features that validate our proposal making it feasible to be widely used as a standard FE method.
Materias
Machine learning; feature engineering; feature selection; NIDS; cybersecurity,; network security; information security
Colecciones
  • Artículos Científicos [11595]
  • Articulos Científicos Ing. Inf. [299]
Attribution 4.0 Internacional
Esta obra está bajo una Licencia Creative Commons Attribution 4.0 Internacional

Listar

Todo RODINComunidades y ColeccionesPor fecha de publicaciónAutoresTítulosMateriasEsta colecciónPor fecha de publicaciónAutoresTítulosMaterias

Mi cuenta

AccederRegistro

Estadísticas

Ver Estadísticas de uso

Información adicional

Acerca de...Deposita en RODINPolíticasNormativasDerechos de autorEnlaces de interésEstadísticasNovedadesPreguntas frecuentes

RODIN está accesible a través de

OpenAIREOAIsterRecolectaHispanaEuropeanaBaseDARTOATDGoogle Académico

Enlaces de interés

Sherpa/RomeoDulcineaROAROpenDOARCreative CommonsORCID

RODIN está gestionado por el Área de Biblioteca, Archivo y Publicaciones de la Universidad de Cádiz

ContactoSugerenciasAtención al Usuario