Show simple item record

dc.contributor.authorMagán Carrión, Roberto
dc.contributor.authorUrdal Muñoz, Daniel
dc.contributor.authorDíaz Cano, Ignacio 
dc.contributor.authorDorronsoro Díaz, Bernabé 
dc.contributor.otherIngeniería Informáticaes_ES
dc.date.accessioned2024-10-23T17:31:36Z
dc.date.available2024-10-23T17:31:36Z
dc.date.issued2024
dc.identifier.issn1368-9894
dc.identifier.issn1367-0751
dc.identifier.urihttp://hdl.handle.net/10498/33708
dc.description.abstractThere is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw data onto derived one suitable for ML models. In this work, we study the effects of applying one such FE technique in different ways on the performance of two ML models (linear and non-linear) and their selected features. This is the Feature as a Counter approach. The derived observations are computed from either with the same number of raw samples, (batch-based approaches) or by aggregating them by time intervals (timestamp-based approach). Results show that there is no significant differences between the proposed approaches neither in the performance of the models nor in the selected features that validate our proposal making it feasible to be widely used as a standard FE method.es_ES
dc.formatapplication/pdfes_ES
dc.language.isoenges_ES
dc.publisherOxford University Presses_ES
dc.rightsAttribution 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.sourceLogic Journal of the IGPL - 2024, Vol. 32 n. 2 pp. 263-280es_ES
dc.subjectMachine learninges_ES
dc.subjectfeature engineeringes_ES
dc.subjectfeature selectiones_ES
dc.subjectNIDSes_ES
dc.subjectcybersecurity,es_ES
dc.subjectnetwork securityes_ES
dc.subjectinformation securityes_ES
dc.titleEvaluating the impact of different Feature as a Counter data aggregation approaches on the performance of NIDSs and their selected featureses_ES
dc.typejournal articlees_ES
dc.rights.accessRightsopen accesses_ES
dc.identifier.doi10.1093/jigpal/jzae007
dc.relation.projectIDinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/RTI2018-100754-B-I00/ES/SISTEMAS INTELIGENTES DE TRANSPORTE URBANO SOSTENIBLE/ es_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/RTI2018-098160-B-I00/ES/DEEP LEARNING IN AIR POLLUTION FORECASTING/ es_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PID2020-114495RB-I00/ES/CREDENCIALES COLABORATIVAS EN SISTEMAS DE IDENTIDAD AUTO-SOBERANA PARA CONTROL DE ACCESO EN IOT/ es_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/JA//FEDER-UCA18-108393es_ES
dc.type.hasVersionVoRes_ES


Files in this item

This item appears in the following Collection(s)

Show simple item record

Attribution 4.0 Internacional
This work is under a Creative Commons License Attribution 4.0 Internacional