Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection

被引:23
作者
Shukla, Alok Kumar [1 ]
Singh, Pradeep [1 ]
机构
[1] NIT Raipur, Raipur, Madhya Pradesh, India
关键词
Classification; Ensemble; Feature Selection; Intrusion Detection; Support Vector Machine; MUTUAL INFORMATION; CLASSIFICATION; DESIGN; FUSION;
D O I
10.4018/IJISP.201907010102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The duplicate and insignificant features present in the data set to cause a long-term problem in the classification of network or web traffic. The insignificant features not only decrease the classification performance but also prevent a classifier from making accurate decisions, exclusively when substantial volumes of data are managed. In this article, the author introduced an ensemble feature selection (EFS) technique, where multiple homogeneous feature selection (FS) methods are combined to choose the optimal subset of relevant and non-redundant features. An intrusion detection system, named support vector machine-based IDS (SVM-IDS), is prompted using the feature selected by the proposed method. The SVM-IDS performance is evaluated using two benchmark datasets of intrusion detection, including KDD Cup 99 and NSL-KDD. Our proposed method provided more significant features for SVM-IDS and compared with the other state-of-the-art methods. The experimental results demonstrate that proposed method achieves a maximum accuracy as 98.95% in KDD Cup 99 data set and 98.12% in the NSL-KDD data set.
引用
收藏
页码:31 / 47
页数:17
相关论文
共 46 条
[1]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[2]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[3]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[4]  
Ambusaidi MA, 2015, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, P295, DOI [10.1109/Trustcom-2015.387, 10.1109/Trustcom.2015.387]
[5]   Supervised, Unsupervised, and Semi-Supervised Feature Selection: A Review on Gene Selection [J].
Ang, Jun Chin ;
Mirzal, Andri ;
Haron, Habibollah ;
Hamed, Haza Nuzly Abdull .
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2016, 13 (05) :971-989
[6]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[7]   Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection [J].
Belavagi, Manjula C. ;
Muniyal, Balachandra .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :117-123
[8]   Feature selection using Joint Mutual Information Maximisation [J].
Bennasar, Mohamed ;
Hicks, Yulia ;
Setchi, Rossitza .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) :8520-8532
[9]  
Burney SMA, 2010, INT J COMPUT SCI NET, V10, P259
[10]  
Chandrasekhar A., 2013, Computer Networks Communications, P499