Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks

被引:10
作者
Bhattacharya, Sangeeta [1 ]
Selvakumar, S. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 620015, Tamil Nadu, India
关键词
multi-measure; multi-weight; feature ranking;
D O I
10.1093/comjnl/bxv078
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient detection of network attacks necessitates the identification of important features, capable of characterizing the attacks. Most of the feature selection techniques are based either on a particular measure or on a particular learning algorithm. As the features selected by each such feature selection technique are different, use of a particular feature selection technique is not enough to assess the importance of a feature. This motivated us to propose a multi-measure multi-weight feature identification approach which combines the filter and wrapper feature selection methods and clustering methods to assign multiple weights to each feature. Two novel weight assignment algorithms for wrapper and clustering method have been proposed to assign weights to each feature. Experiments performed with top weighted features of 10% KDD Cup 99 intrusion detection dataset shows the identified features are indeed important in detecting DoS and probe attacks. Also, the comparison of the proposed approach with the existing algorithms shows that the features identified by the proposed approach detects the attacks with higher accuracy.
引用
收藏
页码:923 / 943
页数:21
相关论文
共 34 条
[1]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[2]  
[Anonymous], INT C AS HIM INT C I
[3]  
[Anonymous], 2007, P 2 ACM S INFORM COM
[4]  
[Anonymous], 12 IEEE INT C FUZZ S
[5]  
[Anonymous], 1993, Proceedings of the 13th International Joint Conference on Artificial Intelligence
[6]  
[Anonymous], ADV METHODS KNOWLEDG
[7]   GMDH-based networks for intelligent intrusion detection [J].
Baig, Zubair A. ;
Sait, Sadiq M. ;
Shaheen, AbdulRahman .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (07) :1731-1740
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]  
Chen Y, 2006, LECT NOTES COMPUT SC, V4318, P153
[10]  
Cheng J, 1999, UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, P101