Makine Öğrenmesi Yöntemleri Kullanarak Web Uygulama Saldırılarının Tespitinde Genetik Öznitelik Seçimi Yaklaşımı
Öz
Anahtar Kelimeler
Kaynakça
- K. Seyhan, T. N. Nguyen, S. Akleylek, K. Cengiz, and S. K. H. Islam, “Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security,” Journal of Information Security and Applications, vol. 58, p. 102788, May 2021, doi: 10.1016/J.JISA.2021.102788.
- H. Ahmetoglu and R. Das, “Derin Öǧrenme ile Büyük Veri Kumelerinden Saldiri Türlerinin Siniflandirilmasi,” 2019. doi: 10.1109/IDAP.2019.8875872.
- “IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB.” https://www.unb.ca/cic/datasets/ids-2017.html (accessed Oct. 27, 2021).
- “IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB.” https://www.unb.ca/cic/datasets/ids-2018.html (accessed Oct. 27, 2021).
- S. M. Kasongo, “Genetic Algorithm Based Feature Selection Technique for Optimal Intrusion Detection,” no. June, pp. 1–22, 2021, doi: 10.20944/preprints202106.0710.v1.
- C. Khammassi and S. Krichen, “A GA-LR wrapper approach for feature selection in network intrusion detection,” Computers & Security, vol. 70, pp. 255–277, Sep. 2017, doi: 10.1016/J.COSE.2017.06.005.
- Y. Zhu, J. Liang, J. Chen, and Z. Ming, “An improved NSGA-III algorithm for feature selection used in intrusion detection,” Knowledge-Based Systems, vol. 116, pp. 74–85, Jan. 2017, doi: 10.1016/J.KNOSYS.2016.10.030.
- H. Ahmetoglu and R. Das, “Analysis of Feature Selection Approaches in Large Scale Cyber Intelligence Data with Deep Learning,” 2021. doi: 10.1109/siu49456.2020.9302200.
Ayrıntılar
Birincil Dil
Türkçe
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
22 Aralık 2021
Gönderilme Tarihi
3 Kasım 2021
Kabul Tarihi
29 Kasım 2021
Yayımlandığı Sayı
Yıl 2021 Cilt: 14 Sayı: 2
Cited By
Unified AI Models for Network Security on Edge Devices
International Journal of Computational Intelligence Systems
https://doi.org/10.1007/s44196-025-00990-6
