Evaluating Feature Selection Methods for Network Intrusion Detection with Kyoto Data

被引:15
|
作者
Najafabadi, Maryam M. [1 ]
Khoshgoftaar, Taghi M. [1 ]
Seliya, Naeem [2 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; feature selection;
D O I
10.1142/S0218539316500017
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Considering the large quantity of the data flowing through the network routers, there is a very high demand to detect malicious and unhealthy network traffic to provide network users with reliable network operation and security of their information. Predictive models should be built to identify whether a network traffic record is healthy or malicious. To build such models, machine learning methods have started to be used for the task of network intrusion detection. Such predictive models must monitor and analyze a large amount of network data in a reasonable amount of time (usually real time). To do so, they cannot always process the whole data and there is a need for data reduction methods, which reduce the amount of data that needs to be processed. Feature selection is one of the data reduction methods that can be used to decrease the process time. It is important to understand which features are most relevant to determining if a network traffic record is malicious and avoid using the whole feature set to make the processing time more efficient. Also it is important that the simple model built from the reduced feature set be as effective as a model which uses all the features. Considering these facts, feature selection is a very important pre-processing step in the detection of network attacks. The goal is to remove irrelevant and redundant features in order to increase the overall effectiveness of an intrusion detection system without negatively affecting the classification performance. Most of the previous feature selection studies in the area of intrusion detection have been applied on the KDD 99 dataset. As KDD 99 is an outdated dataset, in this paper, we compare different feature selection methods on a relatively new dataset, called Kyoto 2006+. There is no comprehensive comparison of different feature selection approaches for this dataset. In the present work, we study four filter-based feature selection methods which are chosen from two categories for the application of network intrusion detection. Three filter-based feature rankers and one filter-based subset evaluation technique are compared together along with the null case which applies no feature selection. We also apply statistical analysis to determine whether performance differences between these feature selection methods are significant or not. We find that among all the feature selection methods, Signal-to-Noise (S2N) gives the best performance results. It also outperforms no feature selection approach in all the experiments.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Supervised feature selection techniques in network intrusion detection: A critical review
    Di Mauro, M.
    Galatro, G.
    Fortino, G.
    Liotta, A.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
  • [42] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
    Alkanhel, Reem
    El-kenawy, El-Sayed M.
    Abdelhamid, Abdelaziz A.
    Ibrahim, Abdelhameed
    Alohali, Manal Abdullah
    Abotaleb, Mostafa
    Khafaga, Doaa Sami
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2677 - 2693
  • [43] Network Intrusion Detection using Feature Selection and Decision tree classifier
    Sheen, Shina
    Rajesh, R.
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1599 - +
  • [44] LNNLS-KH: A Feature Selection Method for Network Intrusion Detection
    Li, Xin
    Yi, Peng
    Wei, Wei
    Jiang, Yiming
    Tian, Le
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [45] The feature selection and intrusion detection problems
    Sung, AH
    Mukkamala, S
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 468 - 482
  • [46] Feature selection for intrusion detection systems
    Kamalov, Firuz
    Moussa, Sherif
    Zgheib, Rita
    Mashaal, Omar
    2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 265 - 269
  • [47] Evaluating feature selection methods for learning in data mining applications
    Piramuthu, S
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2004, 156 (02) : 483 - 494
  • [48] Evaluating feature selection methods for learning in data mining applications
    Piramuthu, S
    PROCEEDINGS OF THE THIRTY-FIRST HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL V: MODELING TECHNOLOGIES AND INTELLIGENT SYSTEMS TRACK, 1998, : 294 - 301
  • [49] Comparative Study on Feature Selection Methods rooted in Swarm Intelligence for Intrusion Detection
    Enache, Adriana-Cristina
    Sgarciu, Valentin
    Togan, Mihai
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 239 - 244
  • [50] An Improved Feature Selection Algorithm Based on MAHALANOBIS Distance for Network Intrusion Detection
    Zhao Yongli
    Zhang Yungui
    Tong Weiming
    Chen Hongzhi
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 69 - 73