An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms

被引:4
作者
Kavitha, G. [1 ]
Elango, N. M. [1 ]
机构
[1] Vellore Inst Technol, Vellore, Tamil Nadu, India
关键词
Anomaly Detection; Classification; Feature Selection; Machine Learning; Network Intrusion; HYBRID;
D O I
10.4018/IJeC.2020100104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of various services that are provided by information technology has been widely accepted by the users who are making use of such services in their day-to-day life activities. Securing such a system application from various intrusions still remains to be a one of the major issues in the current era. Detecting such anomalies from the regular events involves various steps such as data pre-processing, feature selection, and classification. Many of the computational models intend to accurately discriminate the samples of each group for better classification by identifying candidate features prior to the learning phase. This research studies the implementation of a combined feature selection technique such as the GRRF-FWSVM method which is applied to the benchmarked anomaly detection dataset KDD CUP 99. The results prove the novel proposed hybrid model is an effective method in identifying anomalies and it increases the detection rate of about 98.55% of the intrusion detection system with the two most common benchmark models.
引用
收藏
页码:48 / 58
页数:11
相关论文
共 29 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]  
Al-Mamory S.O., 2015, DESIGNING 2 GRAINS L
[3]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[4]  
[Anonymous], 1999, Kdd cup 1999 dataset
[5]  
Balakrishnan S., 2016, INT J COMPUTER SCI A, V3, P145
[6]   Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems [J].
Bostani, Hamid ;
Sheikhan, Mansour .
SOFT COMPUTING, 2017, 21 (09) :2307-2324
[7]  
Chae HeeSu., 2013, RECENT ADV COMPUTER, P184
[8]   A comprehensive survey on network anomaly detection [J].
Fernandes, Gilberto ;
Rodrigues, Joel J. P. C. ;
Carvalho, Luiz Fernando ;
Al-Muhtadi, Jalal F. ;
Proenca, Mario Lemes, Jr. .
TELECOMMUNICATION SYSTEMS, 2019, 70 (03) :447-489
[9]  
Ganapathy S, 2016, INT ARAB J INF TECHN, V13, P44
[10]   A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data [J].
Goldstein, Markus ;
Uchida, Seiichi .
PLOS ONE, 2016, 11 (04)