To: Author
Article Fingerprint
ReserarchID
CSTNWSH205L
An increase in global connectivity and rapid expansion of computer usage and computer networks has made the security of the computer system an important issue; with the industries and cyber communities being faced with new kinds of attacks daily. The high complexity of cyberattacks poses a great challenge to the protection of cyberinfrastructures, Confidentiality, Integrity, and availability of sensitive information stored on it. Intrusion detection systems monitors’ network traffic for suspicious (Intrusive) activity and issues alert when such activity is detected. Building Intrusion detection system that is computationally efficient and effective requires the use of relevant features of the network traffics (packets) identified by feature selection algorithms. This paper implemented K-Nearest Neighbor and Naïve Bayes Intrusion detection models using relevant features of the UNSW-NB15 Intrusion detection dataset selected by Gain Ratio, Information Gain, Relief F and Correlation rankers feature selection techniques.
Olasehinde Olayemi. 2026. \u201cComparative Analysis of Selected Filtered Feature Rankers Evaluators for Cyber Attacks Detection\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 22 (GJCST Volume 22 Issue E1): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 101
Country: Nigeria
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Olasehinde Olayemi (PhD/Dr. count: 0)
View Count (all-time): 269
Total Views (Real + Logic): 3251
Total Downloads (simulated): 41
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
An increase in global connectivity and rapid expansion of computer usage and computer networks has made the security of the computer system an important issue; with the industries and cyber communities being faced with new kinds of attacks daily. The high complexity of cyberattacks poses a great challenge to the protection of cyberinfrastructures, Confidentiality, Integrity, and availability of sensitive information stored on it. Intrusion detection systems monitors’ network traffic for suspicious (Intrusive) activity and issues alert when such activity is detected. Building Intrusion detection system that is computationally efficient and effective requires the use of relevant features of the network traffics (packets) identified by feature selection algorithms. This paper implemented K-Nearest Neighbor and Naïve Bayes Intrusion detection models using relevant features of the UNSW-NB15 Intrusion detection dataset selected by Gain Ratio, Information Gain, Relief F and Correlation rankers feature selection techniques.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.