Skip to main content

A CFS–DNN-Based Intrusion Detection System

  • Conference paper
  • First Online:
Advances in Communication, Devices and Networking

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 462))

Abstract

The Internet communications are being developed to a great extent. With this development, an enormous amount of data is being generated. However, this data is not always secured. Intruders are always trying to misuse this data and gain unauthorized access, and hence, network security is also being compromised. An Intrusion Detection System (IDS) provides an efficient way to handle this. In this paper, an efficient IDS has been proposed which uses the NSL-KDD dataset which is a high-dimensional dataset. The dataset contains a large number of records, labeled as attack or normal. Correlation-based Feature Selection (CFS) method is chosen to select relevant and important features from the dataset for reducing the overall runtime of the proposed model, and a Deep Neural Network (DNN) classifier is used to examine if a record is normal or an attack. We tested our model using model validation and also compared the results with other existing models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Belavagi C. M., and Muniyal B.: Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection. Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016), pp. 117–123, (2016).

    Google Scholar 

  2. Denning., and D. E.: An intrusion detection model. IEEE Transaction on Software Engineering. Software Engineering 13(2), pp. 222–232, (1987).

    Google Scholar 

  3. Singh S. K., Chaurasia N., and Sharma P.: Concept and proposed architecture of Hybrid Intrusion Detection System using data mining. International Journal of Engineering and Advanced Technology (IJEAT)., vol. 2, pp. 274–276, (2013).

    Google Scholar 

  4. Ubhale P. R., and Sahu A. M.: Securing Cloud Computing Environment by means of Intrusion Detection and Prevention Systems (IDPS). International Journal of Computer Science and Management Research., vol. 2, pp. 2430–2435, (2013).

    Google Scholar 

  5. Jennifer G.. D., and Carla E. B.: Feature Selection for Unsupervised Learning, Journal of Machine Learning Research 5, pp. 845–889, (2004).

    Google Scholar 

  6. Yu L., and Liu H.: Efficient Feature Selection via Analysis of Relevance and Redundancy. Journal of Machine Learning Research 5., pp. 1205–1224, (2004).

    Google Scholar 

  7. Datti R., and Verma B.: Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis. International Journal on Computer Science and Engineering (IJCSE)., vol. 2, pp. 1072–1078, (2010).

    Google Scholar 

  8. Aghdam M. H., and Kabiri P.: Feature selection for intrusion detection system using ant colony optimization. International Journal of Network Security., pp. 420–432, (2016).

    Google Scholar 

  9. Jha J., and Ragha L.: Intrusion Detection System using Support Vector Machine, International Journal of Applied Information Systems., pp. 25–30, (2103).

    Google Scholar 

  10. NSL-KDD dataset for network-based intrusion detection system. Available on: http://nsl.cs.unb.ca/NSL-KDD/, (2009).

  11. Tavallaee M., Bagheri E., Lu W., and Ali A. G..: A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009., pp. 53–58, (2009).

    Google Scholar 

  12. MIT Lincoln Labs, 1998 DARPA Intrusion Detection Evaluation. Available on: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/ index.html, February 2008.

  13. Battiti R.: Using Mutual Information for selecting features in Supervised Neural Net Learning. IEEE Transactions on Neural Networks., vol. 5, pp. 537–550, (1994).

    Google Scholar 

  14. Hall M. A.: Correlation-based Feature Selection for Machine Learning, Department of Computer Science, The University of Waikato, New Zealand, (1999).

    Google Scholar 

  15. Goodfellow I., Bengio Y., and Courville A.: Deep Learning, MIT Press (2016) available on http://www.deeplearningbook.org.

  16. Adam Optimizer (Keras official documentation) available on: https://keras.io/optimizers/.

  17. Han J., Kamber M., and Pei J.: Data Mining: Concepts and Techniques (3rd Edition). USA, MA: Morgan Kaufmann Publishers, pp. 359–360, (2012).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandan Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Paul, S., Banerjee, C., Ghoshal, M. (2018). A CFS–DNN-Based Intrusion Detection System. In: Bera, R., Sarkar, S., Chakraborty, S. (eds) Advances in Communication, Devices and Networking. Lecture Notes in Electrical Engineering, vol 462. Springer, Singapore. https://doi.org/10.1007/978-981-10-7901-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7901-6_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7900-9

  • Online ISBN: 978-981-10-7901-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics