Skip to Main content Skip to Navigation
New interface
Conference papers

Towards fast detecting intrusions: using key attributes of network trafic

Abstract : Extracting attributes from network traffic is the first step of network intrusion detection. However, the question of what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian Networks (BN) and Decision trees (C4.5) respectively to select key subsets of attributes for network intrusion detection based on KDD Cup 1999 data. We then used the selected 10 attributes to detect DDoS attacks in the real environments. The empirical results based on KDD Cup 1999 data as well as DDoS attack data show that only using the 10 attributes, the detection accuracy almost remains the same or even becomes better compared with that of using all the 41 attributes with both BN and C4.5 classifiers. Using a small subset of attributes also improves the efficiency of intrusion detection.
Complete list of metadata
Contributor : Thomas Guyet Connect in order to contact the contributor
Submitted on : Thursday, March 4, 2010 - 3:53:52 PM
Last modification on : Monday, October 31, 2022 - 6:58:11 PM


  • HAL Id : inria-00461415, version 1


Wei Wang, Sylvain Gomblaut, Thomas Guyet. Towards fast detecting intrusions: using key attributes of network trafic. The Third International Conference on Internet Monitoring and Protection, Jul 2008, Bucharest, Romania. ⟨inria-00461415⟩



Record views