A hybrid filter-wrapper feature selection method for DDoS detection in cloud computing

被引:10
作者
Belouch, Mustapha [1 ]
Elhadaj, Salah [1 ]
Idhammad, Mohamed [2 ]
机构
[1] Cadi Ayyad Univ, Dept Appl Math & Comp Sci, Marrakech, Morocco
[2] Ibn Zohr Univ, Dept Comp Sci, Agadir, Morocco
关键词
Filter methods; wrapper methods; hybrid feature selection; Cloud DDoS; intrusion detection system;
D O I
10.3233/IDA-173624
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's rapidly emerging computing environment, cloud computing has become a significant trend for the delivery of IT business services, and representes a potential technology resource choice that offers cost effective and scalable processing. However, Distributed Denial of Service (DDoS) attacks continually target cloud services and resource availability, rendering the cloud unavailable to the detriment of both cloud providers and users. In previous research, feature selection, has revealed its importance in the recognition of irrelevant and redundant features, which increases detection rates and decreases processing speeds toward the evaluation of intrusive patterns, while reducing computational complexity. In this work we propose a Hybrid Filter-Wrapper Feature Selection HFWFS method for DDoS detection, which takes advantage of both filter and wrapper methods, to identify the most irrelevant and redundant features in order to form a reduced input subset. Subsequently, it applies a wrapper method to achieve the optimal selection of features. To evaluate the performance of our proposed model, we used two datasets (NSL-KDD and UNSW-NB15) and a Random Tree classifier. The results indicated that the proposed model may reduce the number of features from more than 40 to nine, while maintaining high detection accuracy, in contrast to well-known feature selection methods.
引用
收藏
页码:1209 / 1226
页数:18
相关论文
共 54 条
[1]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[2]  
Afzal W, 2016, STUD COMPUT INTELL, V617, P33, DOI 10.1007/978-3-319-25964-2_3
[3]  
Agarwal Basant, 2013, Computational Linguistics and Intelligent Text Processing. 14th International Conference, CICLing 2013. Proceedings, P13, DOI 10.1007/978-3-642-37256-8_2
[4]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[5]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[6]  
[Anonymous], 2017, SOFT COMPUTING
[7]  
[Anonymous], 2015, MIL COMM INF SYST C
[8]  
[Anonymous], ICML
[9]  
[Anonymous], 2012, ELEMENTS INFORM THEO
[10]  
[Anonymous], J NETW COMPUT APPL