%0 Conference Proceedings %T Bayesian Classifiers in Intrusion Detection Systems %+ Universidad de la Costa = University of la Costa (Unicosta) %+ Universidad del Atlántico (UA) %+ Department of Electronics, Computer Science and Systems [Bologne] (DEIS) %+ Universidad de Málaga [Málaga] = University of Málaga [Málaga] %+ Universidad de Granada = University of Granada (UGR) %+ Universidad Manuela Beltrán (UMB) %A Johan, Mardini-Bovea %A Emiro, De-La-Hoz-Franco %A Diego, Molina-Estren %A Ariza-Colpas, Paola %A Andrés, Ortíz %A Julio, Ortega %A Cárdenas, César %A Collazos-Morales, Carlos %< avec comité de lecture %( Lecture Notes in Computer Science %B 2nd International Conference on Machine Learning for Networking (MLN) %C Paris, France %Y Selma Boumerdassi %Y Éric Renault %Y Paul Mühlethaler %I Springer International Publishing %3 Machine Learning for Networking %V LNCS-12081 %P 379-391 %8 2019-12-03 %D 2019 %R 10.1007/978-3-030-45778-5_26 %K Naïve Bayes %K Bayesian networks %K Feature selection %K IDS %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X To be able to identify computer attacks, detection systems that are based on faults are not dependent on data base upgrades unlike the ones based on misuse. The first type of systems mentioned generate a knowledge pattern from which the usual and unusual traffic is distinguished. Within computer networks, different classification traffic techniques have been implemented in intruder detection systems based on abnormalities. These try to improve the measurement that assess the performance quality of classifiers and reduce computational cost. In this research work, a comparative analysis of the obtained results is carried out after implementing different selection techniques such as Info.Gain, Gain ratio and Relief as well as Bayesian (Naïve Bayes and Bayesians Networks). Hence, 97.6% of right answers were got with 13 features. Likewise, through the implementation of both load balanced methods and attributes normalization and choice, it was also possible to diminish the number of features used in the ID classification process. Also, a reduced computational expense was achieved. %G English %Z TC 6 %2 https://inria.hal.science/hal-03266456/document %2 https://inria.hal.science/hal-03266456/file/487577_1_En_26_Chapter.pdf %L hal-03266456 %U https://inria.hal.science/hal-03266456 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-LNCS-12081 %~ IFIP-MLN