A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection

被引:14
|
作者
Uzun, Birnur [1 ]
Balli, Serkan [2 ]
机构
[1] Mugla Sitki Kocman Univ, Fac Technol, Dept Informat Syst Engn, TR-48000 Mugla, Turkey
[2] Mehmet Akif Ersoy Univ, Bucak Technol Fac, Dept Software Engn, TR-15300 Burdur, Turkey
来源
NEURAL COMPUTING & APPLICATIONS | 2022年 / 34卷 / 20期
关键词
Outlier detection; Machine learning; Feature selection; Classification; Performance analysis; Network security; Intrusion detection systems; DETECTION SYSTEM; ALGORITHM;
D O I
10.1007/s00521-022-07402-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The identification of unusual data in computer networks is a critical task for intrusion detection systems. In this study, a novel approach has been proposed for improving intrusion detection system performance by finding multivariate outliers and optimal feature selection. The NSL-KDD dataset consisting of 41 features has been utilized to create and test the system. Firstly, the ReliefF Feature Selection approach has been employed to identify the best features that maintain the classification performance at a high level and 20 features have been determined. Then, to find outliers in the dataset, the Mahalanobis Distance and Chi-Square approaches have been applied. After that, various machine learning methods have been applied to the dataset, and the results have been compared. According to the results, higher classification success has been reached in nearly half the time as a consequence of 20 features obtained from the feature selection and outlier identification processes, compared to the classification done using 41 features. With 99.2187% accuracy, the Random Forest Algorithm has achieved the best classification success. Finally, it has been observed that the suggested approach provides statistically significant results with a quick detection time and higher classification accuracy.
引用
收藏
页码:17647 / 17662
页数:16
相关论文
共 50 条
  • [31] ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method
    Wang Xingzhu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 141 - 152
  • [32] A Hybrid-based Feature Selection Method for Intrusion Detection System
    Sun, Xibin
    Ye, Heping
    Liu, Xiaolin
    International Journal of Network Security, 2023, 25 (01) : 131 - 139
  • [33] An IWD-based feature selection method for intrusion detection system
    Neha Acharya
    Shailendra Singh
    Soft Computing, 2018, 22 : 4407 - 4416
  • [34] A new intrusion detection method using ensemble classification and feature selection
    Pooyan Azizi doost
    Sadegh Sarhani Moghadam
    Edris Khezri
    Ali Basem
    Mohammad Trik
    Scientific Reports, 15 (1)
  • [35] A Feature Selection Method for Improved Clonal Algorithm Towards Intrusion Detection
    Yin, Chunyong
    Ma, Luyu
    Feng, Lu
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2016, 30 (05)
  • [36] Quick feature selection method and its application on network intrusion detection
    Chen, Tie-Ming
    Ma, Ji-Xia
    Xuan, Yi-Guang
    Cai, Jia-Mei
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 233 - 238
  • [37] A HYBRID METHOD FOR INTRUSION DETECTION WITH GA-BASED FEATURE SELECTION
    Chen, Zh-Xian
    Huang, Hao
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 175 - 186
  • [38] An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
    Zhang, Yang
    Zhang, Hongpo
    Zhang, Bo
    INFORMATION, 2022, 13 (07)
  • [39] SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection
    Zhang, Fei
    Zhen, Peining
    Jing, Dishan
    Tang, Xiaotang
    Chen, Hai-Bao
    Yan, Jie
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (05) : 1024 - 1038
  • [40] Classification Method of Industrial Internet Intrusion Detection Based on Feature Selection
    Ren J.
    Zhang Y.
    Zhang B.
    Li S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1148 - 1159