Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems

被引:35
作者
El-Khatib, Khalil [1 ]
机构
[1] Univ Ontario Inst Technol, Oshawa, ON L1H 7K4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Feature selection; intrusion detection systems; K-means; information gain ratio; wireless networks; neural networks; COMPUTER; MODEL;
D O I
10.1109/TPDS.2009.142
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as deauthentication attacks or MAC layer DoS attacks. In this paper, we propose a novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions. Our model for feature selection uses the information gain ratio measure as a means to compute the relevance of each feature and the k-means classifier to select the optimal set of MAC layer features that can improve the accuracy of intrusion detection systems while reducing the learning time of their learning algorithm. In the experimental section of this paper, we study the impact of the optimization of the feature set for wireless intrusion detection systems on the performance and learning time of different types of classifiers based on neural networks. Experimental results with three types of neural network architectures clearly show that the optimization of a wireless feature set has a significant impact on the efficiency and accuracy of the intrusion detection system.
引用
收藏
页码:1143 / 1149
页数:7
相关论文
共 21 条
[1]  
[Anonymous], 802111999 IEEE
[2]  
[Anonymous], 1998, Feature Extraction, Construction and Selection: A Data Mining Perspective
[3]  
Bellardo J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P15
[4]  
BITTAU A, 2006, P IEEE S SEC PRIV MA
[5]   An artificial immune based intrusion detection model for computer and telecommunication systems [J].
Boukerche, A ;
Jucá, KRL ;
Sobral, JB ;
Notare, MSMA .
PARALLEL COMPUTING, 2004, 30 (5-6) :629-646
[6]   Behavior-based intrusion detection in mobile phone systems [J].
Boukerche, A ;
Notare, MSMA .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2002, 62 (09) :1476-1490
[7]  
Boukerche A., 2003, Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, P42, DOI DOI 10.1145/940991.941000
[8]  
Boukerche A., 2005, HDB ALGORITHMS WIREL
[9]  
BOUKERCHE A., 2008, ALGORITHMS PROTOCOLS
[10]   An agent based and biological inspired real-time intrusion detection and security model for computer network operations [J].
Boukerche, Azzedine ;
Machado, Renato B. ;
Juca, Kathia R. L. ;
Sobral, Joao Bosco M. ;
Notare, Mirela S. M. A. .
COMPUTER COMMUNICATIONS, 2007, 30 (13) :2649-2660