Intrusion detection using Highest Wins feature selection algorithm

被引:13
|
作者
Mohammad, Rami Mustafa A. [1 ]
Alsmadi, Mutasem K. [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Appl Studies & Community Serv, Dept MIS, POB 1982, Dammam, Saudi Arabia
来源
NEURAL COMPUTING & APPLICATIONS | 2021年 / 33卷 / 16期
关键词
Intrusion detection; Naï ve Bayes; Data mining; Feature selection;
D O I
10.1007/s00521-021-05745-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid advancement of Internet stimulates building intelligent data mining systems for detecting intrusion attacks. The performance of such systems might be negatively affected due to the big datasets employed in the learning phase. Determining the appropriate group of features within training datasets is an essential phase when building data mining classification models. Nevertheless, the resulted minimized set of features should maintain or even improve the performance of the classification models. Throughout this article, an innovative feature selection algorithm is proposed and is called "the Highest Wins" (HW). To evaluate the generalization ability of HW, it has been applied for creating classification models using naive Bayes technique from 10 benchmark datasets. The obtained results were compared against two well-known strategies, namely chi-square and information gain. The experimental results confirmed the competitiveness ability of the suggested strategy in terms of various evaluation measurements such as recall, precision, and error rate while significantly decreasing the number of selected features in datasets. Further, the HW is used for building a naive Bayes and decision tree intrusion detection classifiers using the well-known dataset from Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD). The results were promising not just in terms of overall performance, but also in terms of the time needed to build the classification model.
引用
收藏
页码:9805 / 9816
页数:12
相关论文
共 50 条
  • [31] An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm
    Kharwar, Ankit Rajeshkumar
    Thakor, Devendra V.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [32] Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm
    Zhang Ling
    Zhang Jiahao
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2022, 18 (01)
  • [33] Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks
    Kannan, Anand
    Maguire, Gerald Q.
    Sharma, Ayush
    Schoo, Peter
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 416 - 423
  • [34] The feature selection and intrusion detection problems
    Sung, AH
    Mukkamala, S
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 468 - 482
  • [35] Feature selection for intrusion detection systems
    Kamalov, Firuz
    Moussa, Sherif
    Zgheib, Rita
    Mashaal, Omar
    2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 265 - 269
  • [36] Multiclass Intrusion Detection in IoT Using Boosting and Feature Selection
    Hamdouchi, Abderrahmane
    Idri, Ali
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024, 2024, 987 : 128 - 137
  • [37] Feature Selection Using Particle Swarm Optimization in Intrusion Detection
    Ahmad, Iftikhar
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [38] Intrusion Detection Using a New Hybrid Feature Selection Model
    Mohammad, Adel Hamdan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 65 - 80
  • [39] Improving feature selection in anomaly intrusion detection using specifications
    Wang, Y
    Miner, A
    Wong, J
    Uppuluri, P
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 468 - 468
  • [40] Weighted feature extraction using a genetic algorithm for intrusion detection
    Middlemiss, MJ
    Dick, G
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 1669 - 1675