Selection of Effective Network Parameters in Attacks for Intrusion Detection

被引:0
作者
Zargar, Gholam Reza [1 ]
Kabiri, Peyman [2 ]
机构
[1] Khouzestan Elect Power Distribut Co, Ahvaz, Iran
[2] Iran Univ Sci & Technol, Intelligent Automat Lab, Sch Comp Engn, Tehran, Iran
来源
ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS | 2010年 / 6171卷
关键词
Intrusion Detection; Principal Components Analysis; Clustering; Data Dimension Reduction; Feature Selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current Intrusion Detection Systems (IDS) examine a large number of data features to detect intrusion or misuse patterns. Some of the features may be redundant or with a little contribution to the detection process. The purpose of this study is to identify important input features in building an IDS that are computationally efficient and effective. This paper proposes and investigates a selection of effective network parameters for detecting network intrusions that are extracted from Tcpclump DARPA 1998 dataset. Here PCA method is used to determine an optimal feature set. An appropriate feature set helps to build efficient decision model as well as to reduce the population of the feature set. Feature reduction will speed up the training and the testing process for the attack identification system considerably. Tcpclump of DARPA 1998 intrusion dataset was used in the experiments as the test data. Experimental results indicate a reduction in training and testing time while maintaining the detection accuracy within tolerable range.
引用
收藏
页码:643 / +
页数:3
相关论文
共 50 条
  • [41] An Intelligent Fuzzy Rule based Feature Selection for Effective Intrusion Detection
    Riyaz, B.
    Ganapathy, S.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 206 - 211
  • [42] Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
    Tufan, Emrah
    Tezcan, Cihangir
    Acarturk, Cengiz
    IEEE ACCESS, 2021, 9 : 50078 - 50092
  • [43] Multi-strategy RIME optimization algorithm for feature selection of network intrusion detection
    Wang, Lan
    Xu, Jialing
    Jia, Liyun
    Wang, Tao
    Xu, Yujie
    Liu, Xingchen
    COMPUTERS & SECURITY, 2025, 153
  • [44] Industrial Control System Intrusion Detection Based on Feature Selection and Temporal Convolutional Network
    Shi L.
    Hou H.
    Xu X.
    Xu H.
    Chen H.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (06): : 238 - 247
  • [45] Coping with 0-Day Attacks through Unsupervised Network Intrusion Detection
    Casas, Pedro
    Mazel, Johan
    Owezarski, Philippe
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 24 - 29
  • [46] Feature Selection Using Genetic Algorithm to Improve Classification in Network Intrusion Detection System
    Ferriyan, Andrey
    Thamrin, Achmad Husni
    Takeda, Keiji
    Murai, Jun
    2017 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), 2017, : 46 - 49
  • [47] Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network
    Durairaj, Danalakshmi
    Venkatasamy, Thiruppathy Kesavan
    Mehbodniya, Abolfazl
    Umar, Syed
    Alam, Tanweer
    ENERGY SOURCES PART A-RECOVERY UTILIZATION AND ENVIRONMENTAL EFFECTS, 2024, 46 (01) : 1519 - 1541
  • [48] Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism
    Sun, Ning-Qing
    Li, Yang
    FUTURE GENERATION INFORMATION TECHNOLOGY, PROCEEDINGS, 2009, 5899 : 151 - 159
  • [49] Euclidean-based Feature Selection for Network Intrusion Detection
    Suebsing, Anirut
    Hiransakolwong, Nualsawat
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 222 - 229
  • [50] An Effective Semi-supervised Model for Intrusion Detection Using Feature Selection Based LapSVM
    Zhang, Xiaofeng
    Tian, Jianwei
    Zhu, Peidong
    Zhang, Jiexin
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS), 2017, : 284 - 287