Browse > Article
http://dx.doi.org/10.5909/JBE.2008.13.1.92

Effective Feature Selection Model for Network Data Modeling  

Kim, Ho-In (Center for Information Security Technology(CIST), Korea University)
Cho, Jae-Ik (Center for Information Security Technology(CIST), Korea University)
Lee, In-Yong (Center for Information Security Technology(CIST), Korea University)
Moon, Jong-Sub (Center for Information Security Technology(CIST), Korea University)
Publication Information
Journal of Broadcast Engineering / v.13, no.1, 2008 , pp. 92-98 More about this Journal
Abstract
Network data modeling is a essential research for the evaluation for intrusion detection systems performance, network modeling and methods for analyzing network data. In network data modeling, real data from the network must be analyzed and the modeled data must be efficiently composed to reflect a sufficient amount of the original data. In this parer the useful elements of real network data were quantified from packets captured from a huge network. Futhermore, a statistical analysis method was used to find the most effective element for efficiently classifying the modeled data.
Keywords
Network Data Set; Network Feature Selection; Intrusion Detection; Network Data Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Lippmann R.P., Fried D.J., Graf I., Haines J.W, Kendall K.R., McClung D., Weber D., Webster S.E., Wyschogrod D., Cunningham R.K., and Zissman M.A., Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation, in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition(DISCEX), Vol. 2, 12-26, 2000, IEEE Computer Society Press: Los Alamitos, CA   DOI
2 Saharon Rosset, Aron Inger. KDD-cup 99. ACM SIGKDD Explorations Newsletter. KDD-99 Conference report. 2000   DOI
3 Norm O'Rourke, Larry Hatcher, Edward J. Stepandski, Using SAS for Univariate & Multivariate Statistics Second Edition, Wiley InterScience, 2005
4 J. W. Haines. 1999 DARPA Intrusion Detection Evaluation. Technical Report 1062. MIT Lincoln Laboratory. 2001
5 Sergios Theodoridis, Konstantinos Koutroumbas, Pattern Recognition Third Edition, Academic Press, 2006
6 Norm O'Rourke, Larry Hatcher, Edward J. Stepandski, Using SAS for Univariate & Multivariate Statistics Second Edition, Wiley InterScience, 2005
7 Lippmann R.P. and Haines J., Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, in Recent Advances in Intrusion Detection, Third International Workshop,, RAID 2000 Toulouse, France, October 204, 2000 Proceedings, H. Debar, L.ME, and S.F. Wu, Editors. 2000, Springer Verlag, 162-182
8 허명회, 다변량수량화, 자유아카데미, 1999
9 한학용, 패턴인식 개론, 한빛 미디어, 2005
10 Lippmann, R.P., Haines J.W., Fried D.J., Korba J., and Das J., The 1999 DARPA Offline Intrusion Detection Evaluation. Computer Networks, 2000. 34(2), 579-595   DOI   ScienceOn
11 James Lattin, J. Douglas Carroll, Paul E. Green, Analysing Multivariate Data, Thomson Books, 2002