Linear Correlation-Based Feature Selection for Network Intrusion Detection Model

被引:0
作者
Eid, Heba F. [1 ,5 ]
Hassanien, Aboul Ella [2 ,5 ]
Kim, Tai-hoon [3 ]
Banerjee, Soumya [4 ,5 ]
机构
[1] Al Azhar Univ, Fac Sci, Cairo, Egypt
[2] Cairo Univ, Fac Comp & Informat, Giza, Egypt
[3] Hannam Univ, Daejeon, South Korea
[4] Birla Inst Technol, Dept CS, Mesra, India
[5] SRGE, Giza, Egypt
来源
ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS | 2013年 / 381卷
关键词
Network security; Data Reduction; Feature selection; Linear Correlation; Intrusion detection; RELEVANCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Feature selection is a preprocessing phase to machine learning, which leads to increase the classification accuracy and reduce its complexity. However, the increase of data dimensionality poses a challenge to many existing feature selection methods. This paper formulates and validates a method for selecting,optimal feature subset based on the analysis of the Pearson correlation coefficients. We adopt the correlation analysis between two variables as a feature goodness measure. Where, a feature is good if it is highly correlated to the class and is low correlated to the other features. To evaluate the proposed Feature selection method, experiments are applied on NSL-KDD dataset. The experiments shows that, the number of features is reduced from 41 to 17 features, which leads to improve the classification accuracy to 99.1%. Also,The efficiency of the proposed linear correlation feature selection method is demonstrated through extensive comparisons with other well known feature selection methods.
引用
收藏
页码:240 / +
页数:3
相关论文
共 50 条
[21]   A novel combinatorial optimization based feature selection method for network intrusion detection [J].
Nazir, Anjum ;
Khan, Rizwan Ahmed .
COMPUTERS & SECURITY, 2021, 102
[22]   Research on Feature Selection Method of Intrusion Detection Based on Deep Belief Network [J].
BaoyiWang ;
Sun, Shan ;
Zhang, Shaomin .
PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 :556-561
[23]   A Feature Selection Approach for Network Intrusion Detection [J].
Khor, Kok-Chin ;
Ting, Choo-Yee ;
Amnuaisuk, Somnuk-Phon .
2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, :133-137
[24]   A Novel Feature Selection Method Based on Correlation-Based Feature Selection in Cancer Recognition [J].
Lu, Xinguo ;
Peng, Xianghua ;
Deng, Yong ;
Feng, Bingtao ;
Liu, Ping ;
Liao, Bo .
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2014, 11 (02) :427-433
[25]   An optimized ensemble model with advanced feature selection for network intrusion detection [J].
Ahmed, Afaq ;
Asim, Muhammad ;
Ullah, Irshad ;
Zainulabidin ;
Ateya, Abdelhamied A. .
PEERJ COMPUTER SCIENCE, 2024, 10 :1-32
[26]   A Spatial Correlation-Based Hybrid Method for Intrusion Detection [J].
Zhu, Jianqi ;
Mu, Jian ;
Wei, Da ;
Feng, Bao ;
Wang, Youjin ;
Yin, Kexin .
2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, :1097-1102
[27]   IR-IDS: A network intrusion detection method based on causal feature selection and explainable model optimization [J].
Gao, Yazhuo ;
Yang, Lin ;
Zhu, Ran ;
Wu, Yixuan ;
Yang, Feng ;
Cao, Yining .
COMPUTERS & SECURITY, 2025, 155
[28]   Distance Correlation-Based Feature Selection in Random Forest [J].
Ratnasingam, Suthakaran ;
Munoz-Lopez, Jose .
ENTROPY, 2023, 25 (09)
[29]   Improving Effectiveness of Intrusion Detection by Correlation Feature Selection [J].
Nguyen, Hai ;
Franke, Katrin ;
Petrovic, Slobodan .
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, :17-24
[30]   On the relation of causality- versus correlation-based feature selection on model fairness [J].
Saarela, Mirka .
39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, :56-64