A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers

Vitali Herrera-Semenets*, Osvaldo Andrés Pérez-García, Raudel Hernández-León, Jan van den Berg, Christian Doerr

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

17 Citations (Scopus)
17 Downloads (Pure)

Abstract

In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the presence of useless information and the amount of data generated by telecommunication services (leading to a huge dimensional problem), can affect the performance of traditional IDSs. In this sense, a data preprocessing strategy is necessary to reduce data, but reducing data without affecting the accuracy of IDSs represents a challenge. In this paper, we propose a new data preprocessing strategy which reduces the number of features and instances in the training collection without greatly affecting the achieved accuracy of IDSs. Finally, our proposal is evaluated using four different rule-based classifiers, which are tested on real scan and backscatter data collected by a network telescope.

Original languageEnglish
Pages (from-to)272-279
Number of pages8
JournalExpert Systems with Applications
Volume95
DOIs
Publication statusPublished - 2018

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Backscatter
  • Data mining
  • Data reduction
  • Intrusion detection
  • Scan

Fingerprint

Dive into the research topics of 'A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers'. Together they form a unique fingerprint.

Cite this