A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications

被引:11
作者
Ozkan-Okay, Merve [1 ]
Samet, Refik [1 ]
Aslan, Omer [2 ]
Kosunalp, Selahattin [3 ]
Iliev, Teodor [4 ]
Stoyanov, Ivaylo [5 ]
机构
[1] Ankara Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye
[2] Bandirma Onyedi Eylul Univ, Dept Software Engn, TR-10200 Bandirma, Balikesir, Turkiye
[3] Bandirma Onyedi Eylul Univ, Gonen Vocat Sch, Dept Comp Technol, TR-10200 Bandirma, Turkiye
[4] Univ Ruse, Dept Telecommun, Ruse 7017, Bulgaria
[5] Univ Ruse, Dept Elect Power Engn, Ruse 7017, Bulgaria
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 19期
关键词
cyberattacks; intrusion detection system; feature selection; classification; machine learning; SECURITY;
D O I
10.3390/app131911067
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a variety of different attacks including remote-to-user (R2L), user-to-remote (U2R), denial of service (DoS), distributed DDoS, and probing. Firewalls, antivirus scanners, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are widely used to prevent and stop cyber-related attacks. Especially, IDPSs are used to stop and prevent intrusions on communication networks. However, traditional IDSs are no longer effective in detecting complicated cyber attacks from normal network traffic. Because of this, new promising techniques, which specifically utilize data mining, machine learning, and deep learning, need to be proposed in order to distinguish intrusions from normal network traffic. To effectively recognize intrusions, the feature generation, feature selection, and learning processes must be performed delicately before the classification stage. In this study, a new feature selection method called FSAP (Feature Selection Approach) is proposed. In addition, a hybrid attack detection model called SABADT (Signature- and Anomaly-Based Attack Detection Technique) is suggested, which utilizes different classification metrics to recognize attacks. The proposed general method FSACM (Feature Selection and Attack Classification Method) is tested on KDD '99, UNSW-NB15, and CIC-IDS2017 datasets. According to the experiment results, the proposed method outperformed the state-of-the-art methods in the literature in terms of detection, accuracy, and false-alarm rates.
引用
收藏
页数:26
相关论文
共 61 条
[21]   The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems [J].
Iwendi, Celestine ;
Khan, Suleman ;
Anajemba, Joseph Henry ;
Mittal, Mohit ;
Alenezi, Mamdouh ;
Alazab, Mamoun .
SENSORS, 2020, 20 (09)
[22]  
Janarthanan T, 2017, PROC IEEE INT SYMP, P1881, DOI 10.1109/ISIE.2017.8001537
[23]  
Kanimozhi V., 2019, Int. J. Recent Technol. Eng., V7, P443
[24]  
Karimi Z., 2013, Int. J. Comput. Appl, V78, P21, DOI DOI 10.5120/13478-1164
[25]   Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset [J].
Kasongo, Sydney M. ;
Sun, Yanxia .
JOURNAL OF BIG DATA, 2020, 7 (01)
[26]   A GA-LR wrapper approach for feature selection in network intrusion detection [J].
Khammassi, Chaouki ;
Krichen, Saoussen .
COMPUTERS & SECURITY, 2017, 70 :255-277
[27]  
Kocher G., 2021, Analysis of machine learning algorithms with feature selection for intrusion detection using unsw-nb15 dataset, DOI 10.5121/ijnsa.2021.13102
[28]   Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing [J].
Krishnaveni, S. ;
Sivamohan, S. ;
Sridhar, S. S. ;
Prabakaran, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03) :1761-1779
[29]   Building Auto-Encoder Intrusion Detection System based on random forest feature selection [J].
Li, XuKui ;
Chen, Wei ;
Zhang, Qianru ;
Wu, Lifa .
COMPUTERS & SECURITY, 2020, 95
[30]   An efficient intrusion detection system based on support vector machines and gradually feature removal method [J].
Li, Yinhui ;
Xia, Jingbo ;
Zhang, Silan ;
Yan, Jiakai ;
Ai, Xiaochuan ;
Dai, Kuobin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :424-430