An Ensemble Classifier Approach on Different Feature Selection Methods for Intrusion Detection

被引:11
|
作者
Vinutha, H. P. [1 ]
Poornima, B. [1 ]
机构
[1] Bapuji Inst Engn & Technol, Davangere, Karnataka, India
来源
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017 | 2018年 / 672卷
关键词
Intrusion detection system; Feature selection; Ensemble techniques; WEKA; Classification accuracy;
D O I
10.1007/978-981-10-7512-4_44
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Knowing a day's monitoring and analyzing events of network for intrusion detection system is becoming a major task. Intrusion detection system (IDS) is an essential element to detect, identify, and track the attacks. Network attacks are divided into four classes like DoS, Probe, R2L, and U2R. In this paper, ensemble techniques like AdaBoost, Bagging, and Stacking are discussed which helps to build IDS. Ensemble technique is used by combining several machine learning algorithms. Selection of features is one of the important stages in intrusion detection model. Some feature selection methods like Cfs, Chi-square, SU, Gain Ratio, Info Gain, and OneR are used in this paper with suitable search technique to select the relevant features. The selected features are applied on AdaBoost, Bagging, and Stacking with J48 as a base classifier and along with that J48 and PART are used as single classifies. Finally, results are shown that the use of AdaBoost improves the classification accuracy. Experiments and evaluation of the approaches are performed in WEKA data mining tool by using benchmark dataset NSL-KDD '99.
引用
收藏
页码:442 / 451
页数:10
相关论文
共 50 条
  • [41] An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection
    Ye, Zhiwei
    Luo, Jun
    Zhou, Wen
    Wang, Mingwei
    He, Qiyi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 151 : 124 - 136
  • [42] IDS-EFS: Ensemble feature selection-based method for intrusion detection system
    Yassine Akhiat
    Kaouthar Touchanti
    Ahmed Zinedine
    Mohamed Chahhou
    Multimedia Tools and Applications, 2024, 83 : 12917 - 12937
  • [43] Ensemble and Feature Selection-based Intrusion Detection System for Multi-attack Environment
    Khonde, S. R.
    Ulagamuthalvi, V
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [44] A Class Centric Feature and Classifier Ensemble Selection Approach for Music Genre Classification
    Ariyaratne, Hasitha Bimsara
    Zhang, Dengsheng
    Lu, Guojun
    STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, 2012, 7626 : 666 - 674
  • [45] Intrusion Detection using Naive Bayes Classifier with Feature Reduction
    Mukherjee, Saurabh
    Sharma, Neelam
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 119 - 128
  • [46] Intrusion Detection System with an Ensemble Learning and Feature Selection Framework for IoT Networks
    Rohini, G.
    Gnana Kousalya, C.
    Bino, J.
    IETE JOURNAL OF RESEARCH, 2023, 69 (12) : 8859 - 8875
  • [47] Wi-Fi Intrusion Detection Using Weighted-Feature Selection for Neural Networks Classifier
    Aminanto, Muhamad Erza
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), 2017, : 99 - 104
  • [48] A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
    Ayad, Aya G.
    Sakr, Nehal A.
    Hikal, Noha A.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (19) : 26942 - 26984
  • [49] An efficient feature selection based Bayesian and Rough set approach for intrusion detection
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    APPLIED SOFT COMPUTING, 2020, 87 (87)
  • [50] Multi-Agent Intrusion Detection System Using Feature Selection Approach
    Gong, Yi
    Fang, Yong
    Liu, Liang
    Li, Juan
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 528 - 531