The feature selection and intrusion detection problems

被引:0
|
作者
Sung, AH [1 ]
Mukkamala, S [1 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents of cyber attacks hinder the utilization of the Internet to its greatest benefit and incur significant economic losses to individuals, enterprises, and public organizations. This paper presents some recent advances in intrusion detection, feature selection, and malware detection. In intrusion detection, stealthy and low profile attacks that include only few carefully crafted packets over an extended period of time to delude firewalls and the intrusion detection system (IDS) have been difficult to detect. In protection against malware (trojans, worms, viruses, etc.), how to detect polymorphic and metamorphic versions of recognized malware using static scanners is a great challenge. We present in this paper an agent based IDS architecture that is capable of detecting probe attacks at the originating host and denial of service (DoS) attacks at the boundary controllers. We investigate and compare the performance of different classifiers implemented for intrusion detection purposes. Further, we study the performance of the classifiers in real-time detection of probes and DoS attacks, with respect to intrusion data collected on a real operating network that includes a variety of simulated attacks. Feature selection is as important for IDS as it is for many other modeling problems. We present several techniques for feature selection and compare their performance in the IDS application. It is demonstrated that, with appropriately chosen features, both probes and DoS attacks can be detected in real time or near real time at the originating host or at the boundary controllers. We also briefly present some encouraging recent results in detecting polymorphic and metamorphic malware with advanced static, signature-based scanning techniques.
引用
收藏
页码:468 / 482
页数:15
相关论文
共 50 条
  • [1] Feature selection for intrusion detection systems
    Kamalov, Firuz
    Moussa, Sherif
    Zgheib, Rita
    Mashaal, Omar
    [J]. 2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 265 - 269
  • [2] Towards Feature Subset Selection in Intrusion Detection
    Ahmad, Iftikhar
    Amin, Fazal e
    [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 68 - 73
  • [3] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [4] Vitality Based Feature Selection For Intrusion Detection
    Jupriyadi
    Kistijantoro, Achmad Imam
    [J]. 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 93 - 96
  • [5] Genetic Feature Selection in Intrusion Detection System
    Han, Myung-Mook
    Kim, Jaehyoun
    Jeong, Taikyeong
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (02): : 493 - 502
  • [6] Efficient Feature Selection for Intrusion Detection Systems
    Ahmadi, S. Sareh
    Rashad, Sherif
    Elgazzar, Heba
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1029 - 1034
  • [7] A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems
    Vuong, Tuan-Cuong
    Tran, Hung
    Trang, Mai Xuan
    Ngo, Vu-Duc
    Van Luong, Thien
    [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1798 - 1804
  • [8] A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 151 - 158
  • [9] A Cascaded Feature Selection Approach in Network Intrusion Detection
    Sun, Yong
    Liu, Feng
    [J]. 2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 119 - 124
  • [10] Feature selection using rough set in intrusion detection
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2026 - +