Selection of Effective Network Parameters in Attacks for Intrusion Detection

被引:0
|
作者
Zargar, Gholam Reza [1 ]
Kabiri, Peyman [2 ]
机构
[1] Khouzestan Elect Power Distribut Co, Ahvaz, Iran
[2] Iran Univ Sci & Technol, Intelligent Automat Lab, Sch Comp Engn, Tehran, Iran
来源
ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS | 2010年 / 6171卷
关键词
Intrusion Detection; Principal Components Analysis; Clustering; Data Dimension Reduction; Feature Selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current Intrusion Detection Systems (IDS) examine a large number of data features to detect intrusion or misuse patterns. Some of the features may be redundant or with a little contribution to the detection process. The purpose of this study is to identify important input features in building an IDS that are computationally efficient and effective. This paper proposes and investigates a selection of effective network parameters for detecting network intrusions that are extracted from Tcpclump DARPA 1998 dataset. Here PCA method is used to determine an optimal feature set. An appropriate feature set helps to build efficient decision model as well as to reduce the population of the feature set. Feature reduction will speed up the training and the testing process for the attack identification system considerably. Tcpclump of DARPA 1998 intrusion dataset was used in the experiments as the test data. Experimental results indicate a reduction in training and testing time while maintaining the detection accuracy within tolerable range.
引用
收藏
页码:643 / +
页数:3
相关论文
共 50 条
  • [1] Category-Based Selection of Effective Parameters for Intrusion Detection
    Kabiri, Peyman
    Zargar, Gholam Reza
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 181 - 188
  • [2] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [3] Modeling network intrusion detection system using feature selection and parameters optimization
    Kim, Dong Seong
    Park, Gong Sou
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (04) : 1050 - 1057
  • [4] Detection of data integrity attacks by constructing an effective intrusion detection system
    R. B. Benisha
    S. Raja Ratna
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5233 - 5244
  • [5] Detection of data integrity attacks by constructing an effective intrusion detection system
    Benisha, R. B.
    Ratna, S. Raja
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5233 - 5244
  • [6] Identification of Effective Network Features to Detect Smurf Attacks
    Zargar, Gholam Reza
    Kabiri, Peyman.
    2009 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT: SCORED 2009, PROCEEDINGS, 2009, : 49 - 52
  • [7] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [8] A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
    Ozkan-Okay, Merve
    Samet, Refik
    Aslan, Omer
    Kosunalp, Selahattin
    Iliev, Teodor
    Stoyanov, Ivaylo
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [9] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [10] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Mohamed Amine Merzouk
    Frédéric Cuppens
    Nora Boulahia-Cuppens
    Reda Yaich
    Annals of Telecommunications, 2022, 77 : 763 - 775