Evaluating Feature Selection Methods for Network Intrusion Detection with Kyoto Data

被引:14
|
作者
Najafabadi, Maryam M. [1 ]
Khoshgoftaar, Taghi M. [1 ]
Seliya, Naeem [2 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; feature selection;
D O I
10.1142/S0218539316500017
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Considering the large quantity of the data flowing through the network routers, there is a very high demand to detect malicious and unhealthy network traffic to provide network users with reliable network operation and security of their information. Predictive models should be built to identify whether a network traffic record is healthy or malicious. To build such models, machine learning methods have started to be used for the task of network intrusion detection. Such predictive models must monitor and analyze a large amount of network data in a reasonable amount of time (usually real time). To do so, they cannot always process the whole data and there is a need for data reduction methods, which reduce the amount of data that needs to be processed. Feature selection is one of the data reduction methods that can be used to decrease the process time. It is important to understand which features are most relevant to determining if a network traffic record is malicious and avoid using the whole feature set to make the processing time more efficient. Also it is important that the simple model built from the reduced feature set be as effective as a model which uses all the features. Considering these facts, feature selection is a very important pre-processing step in the detection of network attacks. The goal is to remove irrelevant and redundant features in order to increase the overall effectiveness of an intrusion detection system without negatively affecting the classification performance. Most of the previous feature selection studies in the area of intrusion detection have been applied on the KDD 99 dataset. As KDD 99 is an outdated dataset, in this paper, we compare different feature selection methods on a relatively new dataset, called Kyoto 2006+. There is no comprehensive comparison of different feature selection approaches for this dataset. In the present work, we study four filter-based feature selection methods which are chosen from two categories for the application of network intrusion detection. Three filter-based feature rankers and one filter-based subset evaluation technique are compared together along with the null case which applies no feature selection. We also apply statistical analysis to determine whether performance differences between these feature selection methods are significant or not. We find that among all the feature selection methods, Signal-to-Noise (S2N) gives the best performance results. It also outperforms no feature selection approach in all the experiments.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Feature selection and deep learning approach for anomaly network intrusion detection
    Bennaceur, Khadidja
    Sahraoui, Zakaria
    Nacer, Mohamed Ahmad
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (04) : 433 - 453
  • [32] Selection and detection of network intrusion feature based on BPSO-SVM
    College of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    不详
    [J]. Jisuanji Gongcheng, 2006, 8 (37-39):
  • [33] Intrusion Detection System using Bayesian Network and Feature Subset Selection
    Jabbar, M. A.
    Aluvalu, Rajanikanth
    Reddy, S. Sai Satyanarayana
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 640 - 644
  • [34] An optimized ensemble model with advanced feature selection for network intrusion detection
    Ahmed, Afaq
    Asim, Muhammad
    Ullah, Irshad
    Zainulabidin
    Ateya, Abdelhamied A.
    [J]. PeerJ Computer Science, 2024, 10 : 1 - 32
  • [35] An optimized adaptive ensemble model with feature selection for network intrusion detection
    Yang, Zhongjun
    Liu, Zhi
    Zong, Xuejun
    Wang, Guogang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (04):
  • [36] Network Intrusion Detection Through Machine Learning With Efficient Feature Selection
    Desai, Rohan
    Gopalakrishnan, Venkatesh Tiruchirai
    [J]. 2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [37] An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
    Zhang, Yang
    Zhang, Hongpo
    Zhang, Bo
    [J]. INFORMATION, 2022, 13 (07)
  • [38] Quick feature selection method and its application on network intrusion detection
    Chen, Tie-Ming
    Ma, Ji-Xia
    Xuan, Yi-Guang
    Cai, Jia-Mei
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 233 - 238
  • [39] Majority Voting and Feature Selection Based Network Intrusion Detection System
    Patil, Dharmaraj R.
    Pattewar, Tareek M.
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06):
  • [40] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Kang, Seung-Ho
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 325 - 333