Intrusion detection using decision tree classifier with feature reduction technique

被引:4
作者
Raza, Syed Atir [1 ]
Shamim, Sania [2 ]
Khan, Abdul Hannan [1 ]
Anwar, Aqsa [3 ]
机构
[1] Minhaj Univ, Sch Informat Technol, Lahore, Pakistan
[2] Univ Management & Technol, Sch Syst & Technol, Lahore, Pakistan
[3] Minhaj Univ, Sch Software Engn, Lahore, Pakistan
关键词
Feature Selection; Machine Learning Classifier; Decision Tree; RFE; Intrusion Detection; FEATURE ELIMINATION;
D O I
10.22581/muet1982.2302.04
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The number of internet users and network services is increasing rapidly in the recent decade gradually. A Large volume of data is produced and transmitted over the network. Number of security threats to the network has also been increased. Although there are many machine learning approaches and methods are used in intrusion detection systems to detect the attacks, but generally they are not efficient for large datasets and real time detection. Machine learning classifiers using all features of datasets minimized the accuracy of detection for classifier. A reduced feature selection technique that selects the most relevant features to detect the attack with ML approach has been used to obtain higher accuracy. In this paper, we used recursive feature elimination technique and selected more relevant features with machine learning approaches for big data to meet the challenge of detecting the attack. We applied this technique and classifier to NSL KDD dataset. Results showed that selecting all features for detection can maximize the complexity in the context of large data and performance of classifier can be increased by feature selection best in terms of efficiency and accuracy.
引用
收藏
页码:30 / 37
页数:8
相关论文
共 17 条
  • [1] [Anonymous], Decision tree algorithm in Machine Learning-Javatpoint
  • [2] Bakhareva N., 2019, P INT RUSS AUT C RUS, P1, DOI [10.1109/RUSAUTOCON.2019.8867696, DOI 10.1109/RUSAUTOCON.2019.8867696]
  • [3] Bhaskar T., 2019, ADAPTIVE JAYA OPTIMI
  • [4] Dhanabal L., 2015, INT J ADV RES COMPUT, V4, P446, DOI 10.17148/IJARCCE.2015.4696
  • [5] Farid D. M., 2010, INT J NETW SECUR ITS, V2, DOI [10.5121/ijnsa.2010.2202, DOI 10.5121/IJNSA.2010.2202]
  • [6] Fengli Zhang, 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage (NAS), P307, DOI 10.1109/NAS.2013.49
  • [7] Hybrid-Recursive Feature Elimination for Efficient Feature Selection
    Jeon, Hyelynn
    Oh, Sejong
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (09):
  • [8] Mathai K. J., 2019, IEEE INT C EL COMP C, P1
  • [9] Nkiama H, 2016, INT J ADV COMPUT SC, V7, P148
  • [10] Panigrahi R., 2018, INT J ENG TECHNOL, V7, P479, DOI [10.14419/ijet.v7i3.24.22797, DOI 10.14419/IJET.V7I3.24.22797]