Advertisement

Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection

  • Rania A. GhazyEmail author
  • El-Sayed M. El-Rabaie
  • Moawad I. Dessouky
  • Nawal A. El-Fishawy
  • Fathi E. Abd El-Samie
Article
  • 22 Downloads

Abstract

This paper investigates the performance of different feature selection techniques such as ranking and subset-based techniques, aiming to find the optimum collection of features to detect attacks with an appropriate classifier. The results reveal that more accuracy of detection and less false alarms are obtained after eliminating the redundant features and determining the most useful set of features, which increases the intrusion detection system (IDS) performance.

Keywords

Feature selection Intrusion detection Classifiers Network attacks 

Notes

References

  1. 1.
    Sen, S. (2015). A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.CrossRefGoogle Scholar
  2. 2.
    Gyanchandani, M., Yadav, R. N., & Rana, J. L. (2010). Intrusion detection using C4. 5: performance enhancement by classifier combination. International Journal on Signal and Image Processing, 1(03), 46–49.Google Scholar
  3. 3.
    Garg, T., & Khurana, S. S. (2014). Comparison of classification techniques for intrusion detection dataset using WEKA. In International conference on recent advances and innovations in engineering (ICRAIE-2014) (pp. 1–5). IEEE.Google Scholar
  4. 4.
    Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In International conference on parallel (pp. 82–87).Google Scholar
  5. 5.
    Tavallaee, M., & Bagheri, E., Lu, W., & Ghorbani, A. (2009) A detailed analysis of the KDD CUP 99 dataset. In The second IEEE symposium on computational intelligence.Google Scholar
  6. 6.
    http://TheNSL-KDDDataset.htm Accessed April 11, 2016.
  7. 7.
    Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147–157.CrossRefGoogle Scholar
  8. 8.
    Zargar, Gh, & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259–271.CrossRefGoogle Scholar
  9. 9.
    www.softcomputing.net. Accessed August 1, 2015.
  10. 10.
    Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition, 42, 1330–1339.CrossRefGoogle Scholar
  11. 11.
    Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010) Feature selection: An eve evolving frontier in data mining. In Workshop and conference proceedings (Vol. 4, pp. 4–13), Publisher Citeseer.Google Scholar
  12. 12.
    Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral Dissertation, Department of Computer Science, University of Waikato.Google Scholar
  13. 13.
    Thanah, H., Franke, K. S. (2012). Pertovic feature extraction methods for intrusion detection systems. In Threats countermeasures and advances in applied information security (pp. 23–52).Google Scholar
  14. 14.
    Sri Harsha, V. (2010). Ensemble of feature selection techniques for high dimensional data Published Master’s Thesis. Western Kentucky University.Google Scholar
  15. 15.
    Wang, Y., & Makedon, F. (2004). Application of relief-F feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In Proceedings 2004 IEEE computational systems bioinformatics conference, 2004. CSB 2004. (pp. 497–498). IEEE.Google Scholar
  16. 16.
    Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches, IJECSE.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Rania A. Ghazy
    • 1
    Email author
  • El-Sayed M. El-Rabaie
    • 2
  • Moawad I. Dessouky
    • 2
  • Nawal A. El-Fishawy
    • 3
  • Fathi E. Abd El-Samie
    • 2
  1. 1.University of Sadat CityEl-Sadat CityEgypt
  2. 2.Department of Electronics and Electrical Communications Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  3. 3.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt

Personalised recommendations