The feature selection and intrusion detection problems

被引:0
|
作者
Sung, AH [1 ]
Mukkamala, S [1 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents of cyber attacks hinder the utilization of the Internet to its greatest benefit and incur significant economic losses to individuals, enterprises, and public organizations. This paper presents some recent advances in intrusion detection, feature selection, and malware detection. In intrusion detection, stealthy and low profile attacks that include only few carefully crafted packets over an extended period of time to delude firewalls and the intrusion detection system (IDS) have been difficult to detect. In protection against malware (trojans, worms, viruses, etc.), how to detect polymorphic and metamorphic versions of recognized malware using static scanners is a great challenge. We present in this paper an agent based IDS architecture that is capable of detecting probe attacks at the originating host and denial of service (DoS) attacks at the boundary controllers. We investigate and compare the performance of different classifiers implemented for intrusion detection purposes. Further, we study the performance of the classifiers in real-time detection of probes and DoS attacks, with respect to intrusion data collected on a real operating network that includes a variety of simulated attacks. Feature selection is as important for IDS as it is for many other modeling problems. We present several techniques for feature selection and compare their performance in the IDS application. It is demonstrated that, with appropriately chosen features, both probes and DoS attacks can be detected in real time or near real time at the originating host or at the boundary controllers. We also briefly present some encouraging recent results in detecting polymorphic and metamorphic malware with advanced static, signature-based scanning techniques.
引用
收藏
页码:468 / 482
页数:15
相关论文
共 50 条
  • [21] The Research of Intrusion Detection Feature Selection Method in Network
    Ye, Zheng-wang
    [J]. 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 30, 2014, 30 : 306 - 309
  • [22] Enhancing intrusion detection with feature selection and neural network
    Wu, Chunhui
    Li, Wenjuan
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (07) : 3087 - 3105
  • [23] Feature selection for intrusion detection: An evolutionary wrapper approach
    Hofmann, A
    Horeis, T
    Sick, B
    [J]. 2004 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, PROCEEDINGS, 2004, : 1563 - 1568
  • [24] A Feature Selection Based DNN for Intrusion Detection System
    Li, Li-Hua
    Ahmad, Ramli
    Tsai, Wen-Chung
    Sharma, Alok Kumar
    [J]. PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [25] Network intrusion detection through genetic feature selection
    Lee, Chi Hoon
    Shin, Sung Woo
    Chung, Jin Wook
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 109 - +
  • [26] An Intrusion Detection System Using Unsupervised Feature Selection
    Suman, Chanchal
    Tripathy, Somanath
    Saha, Sriparna
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 19 - 24
  • [27] Iterative Per Group Feature Selection For Intrusion Detection
    Chkirbene, Zina
    Erbad, Aiman
    Hamila, Ridha
    Gouissem, Ala
    Mohamed, Amr
    Guizani, Mohsen
    Hamdi, Mounir
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 708 - 713
  • [28] Feature selection using a genetic algorithm for intrusion detection
    Helmer, G
    Wong, J
    Honavar, V
    Miller, L
    [J]. GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 1999, : 1781 - 1781
  • [29] A Novel Algorithm for Feature Selection Used in Intrusion Detection
    Hao, Yongle
    Hou, Ying
    Li, Longjie
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 967 - 974
  • [30] A Comparison of Feature-Selection Methods for Intrusion Detection
    Nguyen, Hai Thanh
    Petrovic, Slobodan
    Franke, Katrin
    [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 242 - 255