DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8380
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNarang, Pratik-
dc.date.accessioned2023-01-09T04:18:43Z-
dc.date.available2023-01-09T04:18:43Z-
dc.date.issued2013-
dc.identifier.urihttps://dl.acm.org/doi/pdf/10.1145/2522548.2523133-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8380-
dc.description.abstractThe use of anomaly-based classification of intrusions has increased significantly for Intrusion Detection Systems. Large number of training data samples and a good ‘feature set’ are two primary requirements to build effective classification models with machine learning algorithms. Since the amount of data available for malicious traffic will often be small compared to the available traces of benign traffic, extraction of ‘good’ features which enable detection of malicious traffic is a challenging area of work. This research work presents preliminary results of comparison of performance of three different feature selection algorithms - Correlation based feature selection, Consistency based subset evaluation and Principal component analysison three different Machine learning techniques- namely Decision trees, Na¨ıve Bayes classifier, and Bayesian Network classifier. These algorithms are evaluated for the detection of Peer-to-Peer (P2P) based botnet traffic.en_US
dc.language.isoenen_US
dc.publisherACM Digital Libraryen_US
dc.subjectComputer Scienceen_US
dc.subjectMachine Learningen_US
dc.subjectFeature Selectionen_US
dc.subjectPeer-to-Peer (P2P)en_US
dc.subjectBotneten_US
dc.titleFeature Selection for Detection of Peer-to-Peer Botnet Trafficen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.