Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector

被引:42
作者
Ahsan, Mostofa [1 ]
Gomes, Rahul [2 ]
Chowdhury, Md. Minhaz [3 ]
Nygard, Kendall E. [1 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58102 USA
[2] Univ Wisconsin Eau Claire, Dept Comp Sci, Eau Claire, WI 54701 USA
[3] East Stroudsburg Univ Penn, Dept Comp Sci, East Stroudsburg, PA 18301 USA
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2021年 / 1卷 / 01期
关键词
dynamic feature selection; meta-learner; cybersecurity; random forest; CNN; RNN; GRU; LSTM; Bi-LSTM; TREE-BASED MODELS; ALGORITHMS;
D O I
10.3390/jcp1010011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning algorithms are becoming very efficient in intrusion detection systems with their real time response and adaptive learning process. A robust machine learning model can be deployed for anomaly detection by using a comprehensive dataset with multiple attack types. Nowadays datasets contain many attributes. Such high dimensionality of datasets poses a significant challenge to information extraction in terms of time and space complexity. Moreover, having so many attributes may be a hindrance towards creation of a decision boundary due to noise in the dataset. Large scale data with redundant or insignificant features increases the computational time and often decreases goodness of fit which is a critical issue in cybersecurity. In this research, we have proposed and implemented an efficient feature selection algorithm to filter insignificant variables. Our proposed Dynamic Feature Selector (DFS) uses statistical analysis and feature importance tests to reduce model complexity and improve prediction accuracy. To evaluate DFS, we conducted experiments on two datasets used for cybersecurity research namely Network Security Laboratory (NSL-KDD) and University of New South Wales (UNSW-NB15). In the meta-learning stage, four algorithms were compared namely Bidirectional Long Short-Term Memory (Bi-LSTM), Gated Recurrent Units, Random Forest and a proposed Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) for accuracy estimation. For NSL-KDD, experiments revealed an increment in accuracy from 99.54% to 99.64% while reducing feature size of one-hot encoded features from 123 to 50. In UNSW-NB15 we observed an increase in accuracy from 90.98% to 92.46% while reducing feature size from 196 to 47. The proposed approach is thus able to achieve higher accuracy while significantly lowering number of features required for processing.
引用
收藏
页码:199 / 218
页数:20
相关论文
共 69 条
[1]  
Ahsan M., 2020, P 35 INT C COMP THEI, P69, DOI DOI 10.29007/J35R
[2]  
Ahsan M, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), P427, DOI [10.1109/eit.2019.8833768, 10.1109/EIT.2019.8833768]
[3]   TREE-BASED MODELS FOR RANDOM DISTRIBUTION OF MASS [J].
ALDOUS, D .
JOURNAL OF STATISTICAL PHYSICS, 1993, 73 (3-4) :625-641
[4]   Walling up Backdoors in Intrusion Detection Systems [J].
Bachl, Maximilian ;
Hartl, Alexander ;
Fabini, Joachim ;
Zseby, Tanja .
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, :8-13
[5]   Comparison of ensemble learning methods applied to network intrusion detection [J].
Belouch, Mustapha ;
El Hadaj, Salah .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
[6]   A hybrid filter-wrapper feature selection method for DDoS detection in cloud computing [J].
Belouch, Mustapha ;
Elhadaj, Salah ;
Idhammad, Mohamed .
INTELLIGENT DATA ANALYSIS, 2018, 22 (06) :1209-1226
[7]   On the importance of the Pearson correlation coefficient in noise reduction [J].
Benesty, Jacob ;
Chen, Jingdong ;
Huang, Yiteng .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2008, 16 (04) :757-765
[8]  
Benesty Jacob., 2009, Noise reduction in speech processing, P1, DOI DOI 10.1007/978-3-642-00296-0_5
[9]  
Bennett K. P., 1992, Decision tree construction via linear programming
[10]  
Tran B, 2016, PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI)