Feature Relevance Analysis and Feature Reduction of UNSW NB-15 Using Neural Networks on MAMLS

被引:6
作者
Rajagopal, Smitha [1 ]
Hareesha, Katiganere Siddaramappa [1 ]
Kundapur, Poornima Panduranga [1 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Manipal, India
来源
ADVANCED COMPUTING AND INTELLIGENT ENGINEERING | 2020年 / 1082卷
关键词
UNSW NB-15; Neural networks; MAMLS; Feature relevance; Feature reduction; SYSTEMS;
D O I
10.1007/978-981-15-1081-6_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Feature relevance is often investigated in classification problems to determine the contribution of each feature, especially when a dataset comprises of numerous features. Feature selection or variable selection aids in creating an accurate predictive model because fewer attributes tend to reduce computational complexity, thereby promising better performance. Machine learning, a preferred approach to intrusion detection, manifests on the appropriate usage of features to improve attack detection rate. A new benchmark dataset, UNSW NB-15, has been used in the study which comprises of five classes of features. This work attempts to demonstrate the relevance of each feature class along with the importance of various combinations of feature classes. During the course of this analysis, 31 possible combinations of features were taken into consideration and their relevance was examined. Empirical results pertaining to feature reduction have shown that an accuracy of 97% could be obtained by using only 23 features. The entire sequence of experimentation was conducted on Microsoft Azure machine learning studio (MAMLS), a scalable machine learning platform. Two-class neural network was used to perform the classification task. Since UNSW NB-15 is a contemporary dataset with modern attack vectors, the research community is still in the process of exploring various facets of this dataset. This article thus intends to offer valuable insights on the significance of features found in UNSW NB-15 dataset.
引用
收藏
页码:321 / 332
页数:12
相关论文
共 18 条
[1]   An Empirical Comparison of Classifiers to Analyze Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, :446-450
[2]  
[Anonymous], 2014, PREDICTIVE ANAL MICR
[3]  
Barga R., 2015, Predictive analytics with Microsoft Azure machine learning
[4]  
Bhamare D., 2016, Information Science and Security (ICISS), 2016 International Conference on, P1, DOI DOI 10.1109/ICISSEC.2016.7885853
[5]  
Chappell D., 2015, Introducing Azure Machine Learning. A Guide for Technical Professionals
[6]   Estimation of prediction error by using K-fold cross-validation [J].
Fushiki, Tadayoshi .
STATISTICS AND COMPUTING, 2011, 21 (02) :137-146
[7]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[8]  
Garreta R, 2013, Learning scikit-learn: machine learning in Python
[9]  
Golik P, 2013, INTERSPEECH, P1755
[10]  
Hackeling G., 2014, Mastering Machine Learning with scikit-learn