An IWD-based feature selection method for intrusion detection system

被引:55
作者
Acharya, Neha [1 ]
Singh, Shailendra [1 ]
机构
[1] NITTTR, Dept Comp Engn & Applicat, Bhopal, AP, India
关键词
Intrusion detection system; Feature selection; Classification; Intelligent water drops algorithm; Support vector machine;
D O I
10.1007/s00500-017-2635-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) is an essential cyber security tool which is used to detect abnormal activity on a network or a host. A general approach towards designing IDS models is to use classifiers as detection units. But a large feature space including noisy, redundant and irrelevant features often leads to low detection and high misclassification rates by the classifier. To address this drawback, the process of selecting most relevant key features for classification is highly important. The objective of this work is to optimize the process of feature selection in a way that improves the accuracy of the classifier. This paper presents an IDS model wherein an intelligent water drops (IWD) algorithm-based feature selection method is proposed. This method uses the IWD algorithm, a nature-inspired optimization algorithm for the feature subset selection along with support vector machine as a classifier for evaluation of the features selected. The experiments are conducted using KDD CUP'99 dataset, and the performance is compared with earlier designs. The experimental results show that the proposed model performs better in terms of higher detection rate, low false alarm rate and improved accuracy than the existing approaches.
引用
收藏
页码:4407 / 4416
页数:10
相关论文
共 16 条
[1]  
Aghdam Mehdi Hosseinzadeh, 2016, International Journal of Network Security, V18, P420
[2]  
Alijla BO, 2013, LECT NOTES COMPUT SC, V7803, P356, DOI 10.1007/978-3-642-36543-0_37
[3]   A hybrid method consisting of GA and SVM for intrusion detection system [J].
Aslahi-Shahri, B. M. ;
Rahmani, R. ;
Chizari, M. ;
Maralani, A. ;
Eslami, M. ;
Golkar, M. J. ;
Ebrahimi, A. .
NEURAL COMPUTING & APPLICATIONS, 2016, 27 (06) :1669-1676
[4]  
Chen R.C., 2009, International Journal of Network Security Its Applications IJNSA, V1, P1
[5]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[6]  
Eid HF, 2010, IEEE INT C INT SYST
[8]   A distance sum-based hybrid method for intrusion detection [J].
Guo, Chun ;
Zhou, Yajian ;
Ping, Yuan ;
Zhang, Zhongkun ;
Liu, Guole ;
Yang, Yixian .
APPLIED INTELLIGENCE, 2014, 40 (01) :178-188
[9]   A GA-based feature selection and parameters optimization for support vector machines [J].
Huang, Cheng-Lung ;
Wang, Chieh-Jen .
EXPERT SYSTEMS WITH APPLICATIONS, 2006, 31 (02) :231-240
[10]   Analysis of network traffic features for anomaly detection [J].
Iglesias, Felix ;
Zseby, Tanja .
MACHINE LEARNING, 2015, 101 (1-3) :59-84