Combinational Feature Selection Approach for Network Intrusion Detection System

被引:0
|
作者
Garg, Tanya [1 ]
Kumar, Yogesh [2 ]
机构
[1] Cent Univ Punjab, Ctr Comp Sci & Technol, Bathinda, India
[2] Punjab Inst Technolgy, Dept Comp Sci & Engn, Kapurthala, India
关键词
Intrusion Detection System; NSL-KDD Dataset; WEKA; Data Mining; Feature Selection Techniques; Garret's Ranking Technique; Boolean AND operator;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn't have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance.
引用
收藏
页码:82 / 87
页数:6
相关论文
共 50 条
  • [1] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [2] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Seung-Ho Kang
    Kuinam J. Kim
    [J]. Cluster Computing, 2016, 19 : 325 - 333
  • [3] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Kang, Seung-Ho
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 325 - 333
  • [4] A Cascaded Feature Selection Approach in Network Intrusion Detection
    Sun, Yong
    Liu, Feng
    [J]. 2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 119 - 124
  • [5] Artificial fish feature selection network intrusion detection system
    Liu J.
    Yan Y.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 132 - 138
  • [6] Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System
    Damtew, Yeshalem Gezahegn
    Chen, Hongmei
    Yuan, Zhong
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2023, 16 (01)
  • [7] Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System
    Yeshalem Gezahegn Damtew
    Hongmei Chen
    Zhong Yuan
    [J]. International Journal of Computational Intelligence Systems, 16
  • [8] Feature selection and deep learning approach for anomaly network intrusion detection
    Bennaceur, Khadidja
    Sahraoui, Zakaria
    Nacer, Mohamed Ahmad
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (04) : 433 - 453
  • [9] An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network
    Pran, S. Gokul
    Raja, Sivakami
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 8561 - 8571
  • [10] A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach
    Divyasree, T. H.
    Sherly, K. K.
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 442 - 449