A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems

被引:0
作者
Vuong, Tuan-Cuong [1 ]
Tran, Hung [1 ]
Trang, Mai Xuan [1 ]
Ngo, Vu-Duc [2 ]
Van Luong, Thien [1 ]
机构
[1] Phenikaa Univ, Fac Comp Sci, Hanoi 12116, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 11657, Vietnam
来源
PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC) | 2022年
关键词
Intrusion detection; UNSW-NB15; feature selection; feature extraction; PCA; machine learning; internet of things; MODEL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) has been playing an important role in many sectors, such as smart cities, smart agriculture, smart healthcare, and smart manufacturing. However, IoT devices are vulnerable to cyber-attacks, which may result in security breaches and data leakages. To effectively prevent these attacks, a variety of machine learning-based network intrusion detection methods for IoT networks have been developed, which often rely on either feature extraction or feature selection techniques for reducing the dimension of input data before being fed to machine learning models. This aims to make the detection complexity low enough for real-time operations, which is particularly vital in intrusion detection systems. This paper provides a comprehensive comparison between these two methods in terms of various performance metrics, namely, precision rate, recall rate, detection accuracy, as well as runtime complexity, in the presence of UNSW-NB15 dataset. Note that such a comparison between feature selection and feature extraction methods has been overlooked in the literature. Furthermore, based on this comparison, we provide a useful guideline on selecting a suitable intrusion detection type for each specific scenario.
引用
收藏
页码:1798 / 1804
页数:7
相关论文
共 20 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[3]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[4]  
Charte David., 2021, IEEE Transactions on Pattern Analysis and Machine Intelligence, P1
[5]  
Dao T.-N., 2021, IEEE INTERNET THINGS, P1
[6]  
Dao T.-N., 2021, IEEE INTERNET THINGS
[7]   Research on collaborative negotiation for e-commerce. [J].
Feng, YQ ;
Lei, Y ;
Li, Y ;
Cao, RZ .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :2085-2088
[8]  
Gehrke J., 2003, Acm Sigkdd Explorations Newsletter, V5, P149, DOI 10.1145/980972.980992
[9]  
Hall M. A., 1999, Proceedings of the Twelfth International Florida AI Research Society Conference, P235
[10]  
Kotsiantis S. B., 2006, DATA PREPROCESSING S