A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications

被引:11
作者
Ozkan-Okay, Merve [1 ]
Samet, Refik [1 ]
Aslan, Omer [2 ]
Kosunalp, Selahattin [3 ]
Iliev, Teodor [4 ]
Stoyanov, Ivaylo [5 ]
机构
[1] Ankara Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye
[2] Bandirma Onyedi Eylul Univ, Dept Software Engn, TR-10200 Bandirma, Balikesir, Turkiye
[3] Bandirma Onyedi Eylul Univ, Gonen Vocat Sch, Dept Comp Technol, TR-10200 Bandirma, Turkiye
[4] Univ Ruse, Dept Telecommun, Ruse 7017, Bulgaria
[5] Univ Ruse, Dept Elect Power Engn, Ruse 7017, Bulgaria
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 19期
关键词
cyberattacks; intrusion detection system; feature selection; classification; machine learning; SECURITY;
D O I
10.3390/app131911067
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a variety of different attacks including remote-to-user (R2L), user-to-remote (U2R), denial of service (DoS), distributed DDoS, and probing. Firewalls, antivirus scanners, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are widely used to prevent and stop cyber-related attacks. Especially, IDPSs are used to stop and prevent intrusions on communication networks. However, traditional IDSs are no longer effective in detecting complicated cyber attacks from normal network traffic. Because of this, new promising techniques, which specifically utilize data mining, machine learning, and deep learning, need to be proposed in order to distinguish intrusions from normal network traffic. To effectively recognize intrusions, the feature generation, feature selection, and learning processes must be performed delicately before the classification stage. In this study, a new feature selection method called FSAP (Feature Selection Approach) is proposed. In addition, a hybrid attack detection model called SABADT (Signature- and Anomaly-Based Attack Detection Technique) is suggested, which utilizes different classification metrics to recognize attacks. The proposed general method FSACM (Feature Selection and Attack Classification Method) is tested on KDD '99, UNSW-NB15, and CIC-IDS2017 datasets. According to the experiment results, the proposed method outperformed the state-of-the-art methods in the literature in terms of detection, accuracy, and false-alarm rates.
引用
收藏
页数:26
相关论文
共 61 条
[1]  
Aghdam Mehdi Hosseinzadeh, 2016, International Journal of Network Security, V18, P420
[2]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[3]  
Al-Safi AHS., 2021, J MECH ENG RES DEV, V44, P253
[4]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[5]   Differential Evolution Wrapper Feature Selection for Intrusion Detection System [J].
Almasoudy, Faezah Hamad ;
Al-Yaseen, Wathiq Laftah ;
Idrees, Ali Kadhum .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :1230-1239
[6]  
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[7]  
Aminanto ME, 2017, 2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), P99, DOI 10.1109/IWBIS.2017.8275109
[8]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[9]   Development of a Scale to Measure Cybercrime-Awareness on Social Media [J].
Arpaci, Ibrahim ;
Aslan, Omer .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (03) :695-705
[10]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)