Research on Intrusion Detection Model Based on Filter Feature Selection Algorithm

被引:0
作者
Liu, Qingjie [1 ]
Li, Yong [1 ]
机构
[1] Beijing Univ Technol, Sch Comp Sci, Beijing, Peoples R China
来源
2024 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION SYSTEMS, ICCIS 2024 | 2024年
关键词
Filter feature selection method; intrusion detection; SVM classifier;
D O I
10.1109/ICCIS63642.2024.10779410
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent decades, various machine learning techniques have been applied to intrusion detection, with Support Vector Machines (SVM) being considered an effective method. However, most research methods based on SVM tend to neglect the importance of data quality, which is crucial for developing high-performance intrusion detection systems. This paper explores the effectiveness of the filter feature selection method. Specifically, the Chi-square test, Pearson Correlation Coefficient, and Maximum Information Coefficient are used as evaluation criteria for feature selection to obtain high-quality training data. Subsequently, the selected data is used to train an SVM classifier to establish an intrusion detection model. Experiments were conducted on two relatively new datasets in the field of intrusion detection, UNSW-NB15 and CICIDS2017. The experimental results indicate that the Pearson Correlation Coefficient and Maximum Information Coefficient methods are more effective and stable.
引用
收藏
页码:120 / 125
页数:6
相关论文
共 18 条
[1]  
Azizan AH, 2021, Annals of Emerging Technologies in Computing, V5, P201, DOI [10.33166/aetic.2021.05.025, DOI 10.33166/AETIC.2021.05.025]
[2]   HIDS: A host based intrusion detection system for cloud computing environment [J].
Deshpande P. ;
Sharma S.C. ;
Peddoju S.K. ;
Junaid S. .
International Journal of System Assurance Engineering and Management, 2018, 9 (03) :567-576
[3]   An Efficient Cloud Network Intrusion Detection System [J].
Ghosh, Partha ;
Mandal, Abhay Kumar ;
Kumar, Rupesh .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 :91-99
[4]   An effective intrusion detection approach using SVM with naive Bayes feature embedding [J].
Gu, Jie ;
Lu, Shan .
COMPUTERS & SECURITY, 2021, 103
[5]   Internet of Things intrusion detection systems: a comprehensive review and future directions [J].
Heidari, Arash ;
Jamali, Mohammad Ali Jabraeil .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06) :3753-3780
[6]  
Ikram ST, 2017, J KING SAUD UNIV-COM, V29, P462, DOI 10.1016/j.jksuci.2015.12.004
[7]   DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm [J].
Latif, Shahid ;
Boulila, Wadii ;
Koubaa, Anis ;
Zou, Zhuo ;
Ahmad, Jawad .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
[8]   Web intrusion detection system combined with feature analysis and SVM optimization [J].
Liu, Chao ;
Yang, Jing ;
Wu, Jinqiu .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
[9]  
Mohamed T., 2022, 2022 INT C CYB RES I, P1
[10]   A comprehensive survey and taxonomy of the SVM-based intrusion detection systems [J].
Mohammadi, Mokhtar ;
Rashid, Tarik A. ;
Karim, Sarkhel H. Taher ;
Aldalwie, Adil Hussain Mohammed ;
Quan Thanh Tho ;
Bidaki, Moazam ;
Rahmani, Amir Masoud ;
Hosseinzadeh, Mehdi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 178