THỬ NGHIỆM CÁC PHƯƠNG PHÁP GIẢM SỐ CHIỀU VECTOR ĐẶC TRƯNG KHI SỬ DỤNG HỌC MÁY ĐỂ PHÁT HIỆN TẤN CÔNG MẠNG IoT
Thông tin bài báo
Ngày nhận bài: 03/12/25                Ngày hoàn thiện: 31/12/25                Ngày đăng: 31/12/25Tóm tắt
Từ khóa
Toàn văn:
PDF (English)Tài liệu tham khảo
[1] A. Almalawi, “A lightweight intrusion detection system for computer networks: Clustering and Monte Carlo cross-entropy approach,” Sensors, vol. 25, no. 7, p. 2235, Apr. 2025.
[2] B. R. Kikissagbe and M. Adda, “Machine learning-based intrusion detection methods in computer networks systems: A comprehensive review,” Electronics, vol. 13, no. 18, p. 3601, Sep. 2024.
[3] GeeksforGeeks, “Chi-square test for feature selection – mathematical explanation,” 2025. [Online]. Available: https://www.geeksforgeeks.org/machine-learning/chi-square-test-for-feature-selection-mathematical-explanation/. [Accessed Aug. 2, 2025].
[4] Built In, “Step-by-step explanation of principal component analysis,” 2025. [Online]. Available: https://builtin.com/data-science/step-step-explanation-principal-component-analysis. [Accessed Aug. 2, 2025].
[5] C. Gritsch, A. Tick, and P. Rosenberger, “Data Cleansing Methods for Big Data: A Systematic Review,” in Proc. 2025 IEEE 29th Int. Conf. on Intelligent Engineering Systems (INES), Palermo, Italy, 2025, pp. 27–32, doi: 10.1109/INES67149.2025.11078189.
[6] I. S. Thaseen, C. A. Kumar, and A. Ahmad, “Integrated intrusion detection model using chi-square feature selection and ensemble of classifiers,” Arabian Journal for Science and Engineering, vol. 44, no. 4, pp. 3357–3368, Apr. 2019.
[7] UCI KDD Archive, “The KDD Cup 1999 dataset,” University of California, Irvine. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [Accessed Aug. 3, 2025].
[8] Canadian Institute for Cybersecurity, “NSL-KDD dataset,” University of New Brunswick, 2009. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html. [Accessed Aug. 3, 2025].
[9] N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in MilCIS 2015 Military Communications and Information Systems Conference, 2015, doi: 10.1109/MilCIS.2015.7348942.
DOI: https://doi.org/10.34238/tnu-jst.14145
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu





