Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System

被引:5
|
作者
Damtew, Yeshalem Gezahegn [1 ,2 ]
Chen, Hongmei [1 ]
Yuan, Zhong [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu 611756, Peoples R China
[2] Debre Berhan Univ, Coll Comp Sci, Debre Berhan 445, Ethiopia
关键词
Feature selection; Machine learning; Network intrusion detection system; MUTUAL INFORMATION; ALGORITHM;
D O I
10.1007/s44196-022-00174-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems get more attention to secure the computers and network systems. Researchers propose different network intrusion detection systems using machine learning techniques. However, the massive amount of data that contain irrelevant and redundant features is still challenging the intrusion detection systems. The redundancy and irrelevance of features may slow the processing time and decrease prediction performance. This paper proposes a Heterogeneous Ensemble Feature Selection (HEFS) method to select the relevant features while achieving better attack detection performance. The proposed method fuses the output feature subsets of five filter feature selection methods, using a union combination method, to obtain an ensemble features subset. HEFS method uses merit-based evaluation to avoid the internal redundancy of the obtained ensemble features subset and acquire the final optimal features. We evaluate the HEFS method with random forest, J48, random tree, and REP tree. In a multi-class NSL-KDD dataset, the experimental results show that the proposed method achieves better prediction performance than the specific feature selection methods and other frameworks.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] A tree-based stacking ensemble technique with feature selection for network intrusion detection
    Rashid, Mamunur
    Kamruzzaman, Joarder
    Imam, Tasadduq
    Wibowo, Santoso
    Gordon, Steven
    APPLIED INTELLIGENCE, 2022, 52 (09) : 9768 - 9781
  • [22] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [23] Intrusion Detection System using Bayesian Network and Feature Subset Selection
    Jabbar, M. A.
    Aluvalu, Rajanikanth
    Reddy, S. Sai Satyanarayana
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 640 - 644
  • [24] A novel combinatorial optimization based feature selection method for network intrusion detection
    Nazir, Anjum
    Khan, Rizwan Ahmed
    COMPUTERS & SECURITY, 2021, 102
  • [25] Firefly algorithm based feature selection for network intrusion detection
    Selvakumar, B.
    Muneeswaran, K.
    COMPUTERS & SECURITY, 2019, 81 : 148 - 155
  • [26] Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection
    Shukla, Alok Kumar
    Singh, Pradeep
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (03) : 31 - 47
  • [27] Attack's Feature Selection-Based Network Intrusion Detection System Using Fuzzy Control Language
    Ramakrishnan, S.
    Devaraju, S.
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2017, 19 (02) : 316 - 328
  • [28] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    S. Krishnaveni
    S. Sivamohan
    S. S. Sridhar
    S. Prabakaran
    Cluster Computing, 2021, 24 : 1761 - 1779
  • [29] Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network
    Sundar, S. Shyam
    Bhuvaneswaran, R. S.
    SaiRamesh, L.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (08): : 2214 - 2229
  • [30] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    Krishnaveni, S.
    Sivamohan, S.
    Sridhar, S. S.
    Prabakaran, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1761 - 1779