A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective

被引:16
|
作者
Varma, P. Ravi Kiran [1 ]
Kumari, V. Valli [2 ]
Kumar, S. Srinivas [3 ]
机构
[1] MVGR Coll Engn, Vizianagaram, Andhra Pradesh, India
[2] Andhra Univ Coll Engn, Visakhapatnam, Andhra Pradesh, India
[3] JNT Univ, Univ Coll Engn Kakinada, Kakinada, Andhra Pradesh, India
关键词
Intrusion detection system; IDS; Feature selection; Soft computing; Survey; ROUGH SET-THEORY;
D O I
10.1007/978-981-10-7871-2_75
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the process of detecting different kinds of attacks in anomaly-based intrusion detection system (IDS), both normal and attack data are profiled with the help of selected attributes. Various types of attributes are collected to create the attack and normal traffic patterns. Some of the attributes are derived from protocol header fields, and some of them represent continuous information profiled over a period. "Curse of Dimensionality" is one of the major issues in IDS. The computational complexity of the model generation and classification time of IDS is directly proportional to the number of attributes of the profile. In a typical IDS preprocessing stage, more significant features among the available features are selected. This paper presents a brief taxonomy of several feature selection methods with emphasis on soft computing techniques, viz., rough sets, fuzzy rough sets, and ant colony optimization.
引用
收藏
页码:785 / 793
页数:9
相关论文
共 50 条
  • [1] Feature Selection Algorithms in Intrusion Detection System: A Survey
    Maza, Sofiane
    Touahria, Mohamed
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10): : 5079 - 5099
  • [2] Incorporating soft computing techniques into a probabilistic intrusion detection system
    Cho, SB
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2002, 32 (02): : 154 - 160
  • [3] Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
    Ganapathy, Sannasi
    Kulothungan, Kanagasabai
    Muthurajkumar, Sannasy
    Vijayalakshmi, Muthusamy
    Yogesh, Palanichamy
    Kannan, Arputharaj
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [4] Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
    Sannasi Ganapathy
    Kanagasabai Kulothungan
    Sannasy Muthurajkumar
    Muthusamy Vijayalakshmi
    Palanichamy Yogesh
    Arputharaj Kannan
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [5] A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
    Torabi, Majid
    Udzir, Nur Izura
    Abdullah, Mohd Taufik
    Yaakob, Razali
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 538 - 553
  • [6] Survey and taxonomy of feature selection algorithms in intrusion detection system
    Chen, You
    Li, Yang
    Cheng, Xue-Qi
    Guo, Li
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 153 - +
  • [7] Utilizing Feature Selection Techniques in Intrusion Detection System for Internet of Things
    Jafier, Shatha H.
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [8] Detection of Intrusion Using Evolutionary Soft Computing Techniques
    Arya, Akansha
    Yadav, Aruna
    Kumar, Sanjeev
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 691 - 696
  • [9] Incorporating soft computing techniques for intrusion detection systems
    Yu, Yingbing
    Patel, Sandip C.
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 1 - 5
  • [10] SCIDS: A soft computing intrusion detection system
    Abraham, A
    Jain, R
    Sanyal, S
    Han, SY
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 252 - 257