An Ensemble Classifier Approach on Different Feature Selection Methods for Intrusion Detection

被引:12
作者
Vinutha, H. P. [1 ]
Poornima, B. [1 ]
机构
[1] Bapuji Inst Engn & Technol, Davangere, Karnataka, India
来源
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017 | 2018年 / 672卷
关键词
Intrusion detection system; Feature selection; Ensemble techniques; WEKA; Classification accuracy;
D O I
10.1007/978-981-10-7512-4_44
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Knowing a day's monitoring and analyzing events of network for intrusion detection system is becoming a major task. Intrusion detection system (IDS) is an essential element to detect, identify, and track the attacks. Network attacks are divided into four classes like DoS, Probe, R2L, and U2R. In this paper, ensemble techniques like AdaBoost, Bagging, and Stacking are discussed which helps to build IDS. Ensemble technique is used by combining several machine learning algorithms. Selection of features is one of the important stages in intrusion detection model. Some feature selection methods like Cfs, Chi-square, SU, Gain Ratio, Info Gain, and OneR are used in this paper with suitable search technique to select the relevant features. The selected features are applied on AdaBoost, Bagging, and Stacking with J48 as a base classifier and along with that J48 and PART are used as single classifies. Finally, results are shown that the use of AdaBoost improves the classification accuracy. Experiments and evaluation of the approaches are performed in WEKA data mining tool by using benchmark dataset NSL-KDD '99.
引用
收藏
页码:442 / 451
页数:10
相关论文
共 19 条
[1]  
Aggarwal Megha, 2013, IJSTR, V2
[2]  
Aldhyani Theyazn H, 2014, INT J COMPUTATIONAL, V4
[3]  
Bisht Neeraj, 2017, CAE, V6
[4]  
Dongre Snehalata S, 2012, INT J MODELING OPTIM, V2
[5]  
Jasmina D, 2014, INFOTEH JAHORINA, V13
[6]  
Kamel Samah Osama M, 2016, IJCNCS, V4, P1
[7]  
Karimi Zahra, 2013, IJCA, V78
[8]  
Kaur Rajender, 2016, IJARCSSE, V6
[9]  
Kumar, 2014, ANAL FEATURE SELECTI
[10]  
Kumar Y., 2013, Int. J. Adv. Trends Comput. Sci. Eng, V2, P47