Machine Learning Techniques for feature Reduction in Intrusion Detection Systems: A Comparison

被引:11
作者
Bahrololum, M. [1 ]
Salahi, E. [1 ]
Khaleghi, M. [1 ]
机构
[1] Iran Telecommun Res Ctr, IT Secur & Syst Grp, Tehran, Iran
来源
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2009年
关键词
Intrusion Detection System; Decision Tree; Flexible Neural Tree; Particle Swarm Optimization;
D O I
10.1109/ICCIT.2009.89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
in recent years, intrusion detection has emerged as an important technique for network security. Machine learning techniques have been applied to the field of intrusion detection. They can learn normal and anomalous patterns from training data and via Feature selection improving classification by searching for the subset of features which best classifies the training data to detect attacks on computer system. The quality of features directly affects the performance of classification. Many feature selection methods introduced to remove redundant and irrelevant features, because raw features may reduce accuracy or robustness of classification. In this paper we compared three methods for feature selection based on Decision trees (DT), Flexible Neural Tree (FNT) and Particle Swarm Optimization (PSO). The results based on comparison of three methods on DARPA KDD99 benchmark dataset indicate that DT has almost better accuracy.
引用
收藏
页码:1091 / 1095
页数:5
相关论文
共 50 条
[41]   Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems [J].
Awad, Mohammed ;
Fraihat, Salam .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (05)
[42]   Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges [J].
Kocher, Geeta ;
Kumar, Gulshan .
SOFT COMPUTING, 2021, 25 (15) :9731-9763
[43]   Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges [J].
Geeta Kocher ;
Gulshan Kumar .
Soft Computing, 2021, 25 :9731-9763
[44]   Feature Reduction and Anomaly Detection in IoT Using Machine Learning Algorithms [J].
Hamdan, Adel ;
Tahboush, Muhannad ;
Adawy, Mohammad ;
Alwada'n, Tariq ;
Ghwanmeh, Sameh .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) :463-470
[45]   On Evaluation of Network Intrusion Detection Systems: Statistical Analysis of CIDDS-001 Dataset Using Machine Learning Techniques [J].
Verma, Abhishek ;
Ranga, Virender .
PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2018, 26 (03) :1307-1331
[46]   Real-Time Hybrid Intrusion Detection System Using Machine Learning Techniques [J].
Dutt, Inadyuti ;
Borah, Samarjeet ;
Maitra, Indra Kanta ;
Bhowmik, Kuharan ;
Maity, Ayindrilla ;
Das, Suvosmita .
ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 :885-894
[47]   Machine Learning Techniques for Network-based Intrusion Detection System: A Survey Paper [J].
Ahmed, Lubna Ali Hassan ;
Hamad, Yahia Abdalla Mohamed .
2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, :1024-+
[48]   Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques [J].
Rincy, Thomas N. ;
Gupta, Roopam .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[49]   Intrusion Detection System using Aggregation of Machine Learning Algorithms [J].
Arivarasan, K. ;
Obaidat, Mohammad S. .
2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS, 2022, :123-130
[50]   An Efficient Deep Learning-based Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques [J].
Karamollaoglu, Hamdullah ;
Dogru, Ibrahim Alper ;
Yucedag, Ibrahim .
INFORMATION TECHNOLOGY AND CONTROL, 2024, 53 (01) :243-261