Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System

被引:117
作者
Thakkar, Ankit [1 ]
Lohiya, Ritika [1 ]
机构
[1] Nirma Univ, Inst Technol, Ahmadabad 382481, Gujarat, India
关键词
Intrusion Detection System; Deep Learning; Filter-based feature selection; Deep Neural Network; Standard deviation; Fusion of statistical importance;
D O I
10.1016/j.inffus.2022.09.026
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) is an essential part of network as it contributes towards securing the network against various vulnerabilities and threats. Over the past decades, there has been comprehensive study in the field of IDS and various approaches have been developed to design intrusion detection and classification system. With the proliferation in the usage of Deep Learning (DL) techniques and their ability to learn data extensively, we aim to design Deep Neural Network (DNN)-based IDS. In this study, we aim to focus on enhancing the performance of DNN-based IDS by proposing a novel feature selection technique that selects features via fusion of statistical importance using Standard Deviation and Difference of Mean and Median. Here, in the proposed approach, features are pruned based on their rank derived using fusion of statistical importance. Moreover, fusion of statistical importance aims to derive relevant features that possess high discernibility and deviation, that assists in better learning of data. The performance of the proposed approach is evaluated using three intrusion detection datasets, namely, NSL-KDD, UNSW_NB-15, and CIC-IDS-2017. Performance analysis is presented in terms of different evaluation metrics such as accuracy, precision, recall, f-score, and False Positive Rate (FPR) and the results are compared with existing feature selection techniques. Apart from evaluation metrics, performance comparison is also presented in terms of execution time. Moreover, results achieved are also statistically tested using Wilcoxon Signed Rank test.
引用
收藏
页码:353 / 363
页数:11
相关论文
共 54 条
[1]  
Chang MA, 2020, Arxiv, DOI arXiv:2004.10275
[2]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[3]   A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms [J].
Almomani, Omar .
SYMMETRY-BASEL, 2020, 12 (06) :1-20
[4]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[5]   Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools [J].
Bagyalakshmi, G. ;
Rajkumar, G. ;
Arunkumar, N. ;
Easwaran, M. ;
Narasimhan, K. ;
Elamaran, V ;
Solarte, Mario ;
Hernandez, Ivan ;
Ramirez-Gonzalez, Gustavo .
IEEE ACCESS, 2018, 6 :57144-57151
[6]  
Belouch M, 2017, INT J ADV COMPUT SC, V8, P389
[7]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[8]  
Chou T-S., 2008, INT J COMPUTATIONAL, V4, P196
[9]  
Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
[10]   ON THE EXPECTED DIFFERENCE BETWEEN MEAN AND MEDIAN [J].
de Nijs, Robin ;
Klausen, Thomas Levin .
ELECTRONIC JOURNAL OF APPLIED STATISTICAL ANALYSIS, 2013, 6 (01) :110-117