Comparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection

α
Olasehinde Olayemi
Olasehinde Olayemi

Send Message

To: Author

Comparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection

Article Fingerprint

ReserarchID

CSTNWSH205L

Comparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

An increase in global connectivity and rapid expansion of computer usage and computer networks has made the security of the computer system an important issue; with the industries and cyber communities being faced with new kinds of attacks daily. The high complexity of cyberattacks poses a great challenge to the protection of cyberinfrastructures, Confidentiality, Integrity, and availability of sensitive information stored on it. Intrusion detection systems monitors’ network traffic for suspicious (Intrusive) activity and issues alert when such activity is detected. Building Intrusion detection system that is computationally efficient and effective requires the use of relevant features of the network traffics (packets) identified by feature selection algorithms. This paper implemented K-Nearest Neighbor and Naïve Bayes Intrusion detection models using relevant features of the UNSW-NB15 Intrusion detection dataset selected by Gain Ratio, Information Gain, Relief F and Correlation rankers feature selection techniques.

References

17 Cites in Article
  1. F Schreier (2015). On Cyberwarfare, DCAF Horizon 2015 working paper.
  2. P Kavita,D Pranjali (2014). Survey on Data Mining Techniques for Intrusion Detection System.
  3. Isabelle,Andre (2003). An Introduction to Variable and Feature Selection.
  4. O Olasehinde,K Williams,B Adegoke (2019). Reduced Features Intrusion Detection Systems Classification Accuracy Improvement.
  5. W Tariq,M Arshad,M Saqib,N Gul (2012). Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic.
  6. Prasanta Gogoi,Monowar Bhuyan,D Bhattacharyya,J Kalita (2012). Packet and Flow Based Network Intrusion Dataset.
  7. W Duch,K Grabczewski,T Winiarski,J Biesiada,A Kachel (2003). Feature selection based on information theory, consistency and separability indices.
  8. Wang,Gombault (2008). Efficient detection of DDoS attacks with important attributes.
  9. O Opeyemi,R Kim-Kwang,D Ali,X Zheng,Mqhele (2016). Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
  10. G Qu,S Hariri,M Yousif (2005). A new dependency and correlation analysis for features.
  11. J Munson,T Khoshgoftaar (1989). The dimensionality of program complexity.
  12. Girish Chandrashekar,Ferat Sahin (2014). A survey on feature selection methods.
  13. N Moustafa,Slay J (2015). UNSW-NB15: A Comprehensive DataSet for Network Intrusion Detection Systems Military Communications and Information Systems Conference.
  14. T Mitchell (1997). Levin, David Saul, (born 28 Jan. 1962), Chief Executive, McGraw-Hill Education, New York, since 2014.
  15. C Sang-Hyun,C Hee-Su (2014). Feature Selection using Attribute Ratio in NSL-KDD data.
  16. Ghadah Aldehim,Wenjia Wang (2017). Determining appropriate approaches for using data in feature selection.
  17. Ghadah Aldehim,Wenjia Wang (2017). Determining appropriate approaches for using data in feature selection.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Olasehinde Olayemi. 2026. \u201cComparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 22 (GJCST Volume 22 Issue E1): .

Download Citation

Enhanced cybersecurity evaluation using feature ranking techniques.
Issue Cover
GJCST Volume 22 Issue E1
Pg. 37- 44
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: K.4.4
Version of record

v1.2

Issue date

March 12, 2022

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 3251
Total Downloads: 41
2026 Trends
Related Research

Published Article

An increase in global connectivity and rapid expansion of computer usage and computer networks has made the security of the computer system an important issue; with the industries and cyber communities being faced with new kinds of attacks daily. The high complexity of cyberattacks poses a great challenge to the protection of cyberinfrastructures, Confidentiality, Integrity, and availability of sensitive information stored on it. Intrusion detection systems monitors’ network traffic for suspicious (Intrusive) activity and issues alert when such activity is detected. Building Intrusion detection system that is computationally efficient and effective requires the use of relevant features of the network traffics (packets) identified by feature selection algorithms. This paper implemented K-Nearest Neighbor and Naïve Bayes Intrusion detection models using relevant features of the UNSW-NB15 Intrusion detection dataset selected by Gain Ratio, Information Gain, Relief F and Correlation rankers feature selection techniques.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Comparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection

Olasehinde Olayemi
Olasehinde Olayemi

Research Journals