CFP last date
20 January 2025
Reseach Article

Exploratory Data Model for Effective WLAN Anomaly Detection based on Feature Construction and Reduction

by Ajay M. Patel, A. R. Patel, Hiral R. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 6
Year of Publication: 2012
Authors: Ajay M. Patel, A. R. Patel, Hiral R. Patel
10.5120/7776-0861

Ajay M. Patel, A. R. Patel, Hiral R. Patel . Exploratory Data Model for Effective WLAN Anomaly Detection based on Feature Construction and Reduction. International Journal of Computer Applications. 50, 6 ( July 2012), 22-26. DOI=10.5120/7776-0861

@article{ 10.5120/7776-0861,
author = { Ajay M. Patel, A. R. Patel, Hiral R. Patel },
title = { Exploratory Data Model for Effective WLAN Anomaly Detection based on Feature Construction and Reduction },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 6 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number6/7776-0861/ },
doi = { 10.5120/7776-0861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:36.194984+05:30
%A Ajay M. Patel
%A A. R. Patel
%A Hiral R. Patel
%T Exploratory Data Model for Effective WLAN Anomaly Detection based on Feature Construction and Reduction
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 6
%P 22-26
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The efficient and effective Anomaly detection system essentially requires identifying the behavior analysis for each activity. For this purpose unsupervised techniques are used but the accuracy and reliability of them results depend on the data set which have used for modeling. It is essential to identify important input features, missing values, redundancy, feature exploration etc… So for the data preprocessing different statistical analytical methods are used. In this paper, a statistical feature construction scheme is proposed based on Factor analysis. The proposed Feature construction model provides the way to remove redundancy, identify missing values and co-linearity between the initial data set. Experimental result shows the related good features are factorized using statistical measures. So it will improve the performance of the unsupervised algorithm results for the effective anomaly detection system.

References
  1. Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. V´aclav Sn´a?sel, Jan Plato?s, Pavel Kr¨omer,Ajith Abraham.
  2. Feature Construction Scheme for Efficient Intrusion Detection System. EUNHYE KIM, SEUNGMIN LEE, KIHOON KWON AND SEHUN KIM. 2010. Korea : JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, , 2010. 527-547 .
  3. Factor-analysis based anomaly detection and clustering. Ningning Wua, *, Jing Zhangb. Elsevier. s. l. : Decision Support Systems 42 (2006), Elsevier, Vol. 42. 375– 389.
  4. Data Preprocessing for anomaly based network intrusion detection: A Review. Jonathan J. Davis, Andrew J. Clark. 2011. s. l. : Computers & Securities, 2011, Vol. 30. 353-375.
  5. DeCoster, Jamie. August 1, 1998. Overview of Factor Analysis. Department of Psychology, Tuscaloosa, AL 35487-0348 : August 1, 1998.
  6. Anglim, Jeromy. 2007. Cluster Analysis & Factor Analysis. http://jeromyanglim. googlepages. com/. [Online] 2007. 325-711 Research Methods.
  7. Field, Dr Andy. 2005. Factor Analysis using SPSS. s. l. : (Research Methods II): Factor Analysis on SPSS, 2005. C8057.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Detection Factor Analysis Feature Construction Intrusion Linearity Reduction