Skip to main content

Feature Selection Method Based on Correlation Tree

  • Conference paper
  • First Online:
Recent Advances in Information and Communication Technology 2020 (IC2IT 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1149))

Included in the following conference series:

  • 283 Accesses

Abstract

Machine learning is one of techniques adapted to detect intrusion for cyber security. One of importance techniques to find anomaly is classification. But classification with huge dataset has the resources and time consumption. Feature selection is choice to reduce the data dimension to improve processing performance. In this paper, we introduce the new feature selection method that selects some fields of data set using position of each feature in correlation tree. Then, the result from the correlation tree feature selection of KDDCUP’99 data set are compared with two feature selection technique, correlation of coefficient (CC-type) and BFS by using three reference classifier, Decision Tree (DT), Random Forest (RF), and Naive Bayes (NB).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., Karimipour, H.: Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80–88 (2019)

    Google Scholar 

  2. Eid, H.F., Hassanien, A.E., Kim, T.-H., Banerjee, S.: Linear correlation-based feature selection for network intrusion detection model. In: The International Conference on Advances in Security of Information and Communication, pp. 240–248 (2013)

    Google Scholar 

  3. Rachburee, N., Punlumjeak, W.: Big data analytics: feature selection and machine learning for intrusion detection on microsoft azure platform. J. Telecommun. Electron. Comput. Eng. 9(1–4), 107–111 (2017)

    Google Scholar 

  4. Selvamani, D., Selvi, V.: A comparative study on the feature selection techniques for intrusion detection system. Asian J. Comput. Sci. Technol. 8(1), 42–47 (2019)

    Google Scholar 

  5. Naganhalli, N.S., Terdal, S.: Network intrusion detection using supervised machine learning technique. Int. J. Sci. Technol. Res. 8(09), 345–350 (2019)

    Google Scholar 

  6. El-Sappagh, S., Mohammed, E.-S., AlSheshtawy, T.A.: Multi-layer classifier for minimizing false intrusion. Int. J. Netw. Secur. Appl. 11(03), 43–52 (2019)

    Google Scholar 

  7. Gunduz, S.Y., Çeter, M.N.: Feature selection and comparison of classification algorithms for intrusion detection. Anadolu Univ. J. Sci. Technol. A – Appl. Sci. Eng. 19(1), 206–218 (2018)

    Google Scholar 

  8. Ugochukwu, C.J., Bennett, E.O.: An intrusion detection system using machine learning algorithm. Int. J. Comput. Sci. Math. Theory 4(1), 39–47 (2018)

    Google Scholar 

  9. Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on big data environment. J. Big Data 5(1), 34 (2018). https://doi.org/10.1186/s40537-018-0145-4

    Article  Google Scholar 

  10. Devi, K., Sukumar, R., Suresh Babu, R.: Lightweight network intrusion detection system using chi-square and cuckoo search optimization algorithms with decision tree classifier. Carib. J. Sci. 53(1), 117–129 (2019)

    Google Scholar 

  11. Priyadarsini, P.I., Sai, M.S.S., Suneetha, A., Santhi, M.V.B.T.: Robust feature selection technique for intrusion detection system. Int. J. Control Autom. 11(2), 33–44 (2018)

    Article  Google Scholar 

  12. Malhotra, H., Sharma, P.: Intrusion detection using machine learning and feature selection. Int. J. Comput. Netw. Inf. Secur. 11(4), 43–52 (2019)

    Google Scholar 

  13. Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: An efficiency optimization for network intrusion detection system. Int. J. Comput. Netw. Inf. Secur. 11(10), 1–11 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prajak Yapila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yapila, P., Threepak, T. (2020). Feature Selection Method Based on Correlation Tree. In: Meesad, P., Sodsee, S. (eds) Recent Advances in Information and Communication Technology 2020. IC2IT 2020. Advances in Intelligent Systems and Computing, vol 1149. Springer, Cham. https://doi.org/10.1007/978-3-030-44044-2_8

Download citation

Publish with us

Policies and ethics