Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system

被引:66
作者
Al-Yaseen, Wathiq Laftah [1 ]
Idrees, Ali Kadhum [2 ]
Almasoudy, Faezah Hamad [3 ]
机构
[1] Al Furat Al Awsat Tech Univ, Kerbala Tech Inst, Kerbala 56001, Iraq
[2] Univ Babylon, Dept Comp Sci, Babylon, Iraq
[3] Univ Kerbala, Coll Agr, Dept Anim Prod, Karbala, Iraq
关键词
Intrusion detection system (IDS); Feature selection; Differential evolution (DE); Extreme learning machine (ELM); NSL-KDD; ALGORITHM; NETWORK; OPTIMIZATION; SECURITY; ATTACKS;
D O I
10.1016/j.patcog.2022.108912
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The intrusion detection system (IDS) has gained a rapid increase of interest due to its widely recognized potential in various security fields, however, it suffers from several challenges. Different network datasets have several redundant and irrelevant features that affect the decision of the IDS classifier. Therefore, it is essential to decrease these features to improve the system performance. In this paper, an efficient wrap-per feature selection method is proposed for improving the performance and decreasing the processing time of the IDS. The proposed approach employs a differential evaluation algorithm to select the useful features whilst the extreme learning machine classifier is applied after feature selection to evaluate the selected features. Many experiments are performed using the full NSL-KDD dataset to evaluate the per-formance of the proposed method. The results prove that the proposed approach can efficiently reduce the features, increase the accuracy, reduce the false alarm rates, and improve the processing time of the IDS in comparison to other recent related works.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 38 条
[11]   Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier [J].
Gaikwad, D. P. ;
Thool, Ravindra C. .
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 :92-98
[12]   Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers [J].
Ghazy, Rania A. ;
El-Rabaie, El-Sayed M. ;
Dessouky, Moawad I. ;
El-Fishawy, Nawal A. ;
Abd El-Samie, Fathi E. .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) :1689-1706
[13]   A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark [J].
Gupta, Govind P. ;
Kulariya, Manish .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :824-831
[14]  
Haq Nutan Farah, 2015, International Journal of Advanced Research in Artificial Intelligence, V4, P9
[15]  
Ikram ST, 2017, J KING SAUD UNIV-COM, V29, P462, DOI 10.1016/j.jksuci.2015.12.004
[16]  
Ingre B, 2015, 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), P92, DOI 10.1109/SPACES.2015.7058223
[17]  
Kabir M.R., 2017, International Journal of Computer Applications, V166, P13, DOI DOI 10.5120/IJCA2017913992
[18]   A GA-LR wrapper approach for feature selection in network intrusion detection [J].
Khammassi, Chaouki ;
Krichen, Saoussen .
COMPUTERS & SECURITY, 2017, 70 :255-277
[19]  
Khan J.A., 2016, Int. J. Sci. Res. Sci., V2, P202
[20]   Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier [J].
Lee, Jinlee ;
Park, Dooho ;
Lee, Changhoon .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (10) :5112-5128