Feature Selection Methods Simultaneously Improve the Detection Accuracy and Model Building Time of Machine Learning Classifiers

被引:27
作者
Alabdulwahab, Saleh [1 ]
Moon, BongKyo [1 ]
机构
[1] Dongguk Univ, Dept Comp Sci & Engn, 30 Pildong Ro 1 Gil, Seoul 04620, South Korea
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 09期
关键词
IDS; ML classifiers; information security; network; Weka; NSL-KDD; INTRUSION DETECTION; ALGORITHM; HYBRID; SYSTEM;
D O I
10.3390/sym12091424
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The detection accuracy and model building time of machine learning (ML) classifiers are vital aspects for an intrusion detection system (IDS) to predict attacks in real life. Recently, researchers have introduced feature selection methods to increase the detection accuracy and minimize the model building time of a limited number of ML classifiers. Therefore, identifying more ML classifiers with very high detection accuracy and the lowest possible model building time is necessary. In this study, the authors tested six supervised classifiers on a full NSL-KDD training dataset (a benchmark record for Internet traffic) using 10-fold cross-validation in the Weka tool with and without feature selection/reduction methods. The authors aimed to identify more options to outperform and secure classifiers with the highest detection accuracy and lowest model building time. The results show that the feature selection/reduction methods, including the wrapper method in combination with the discretize filter, the filter method in combination with the discretize filter, and the discretize filter, can significantly decrease model building time without compromising detection accuracy. The suggested ML algorithms and feature selection/reduction methods are automated pattern recognition approaches to detect network attacks, which are within the scope of the Symmetry journal.
引用
收藏
页数:20
相关论文
共 34 条
[1]  
Ahmad K.A., 2018, INT J COMPUT SCI INF, V10, P48, DOI [10.30880/ijie.2018.10.09.025, DOI 10.30880/IJIE.2018.10.09.025]
[2]   A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms [J].
Almomani, Omar .
SYMMETRY-BASEL, 2020, 12 (06) :1-20
[3]  
[Anonymous], JOURNAL OF COMPUTING, DOI DOI 10.20532/CIT.2016.1002701
[4]   Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection [J].
Belavagi, Manjula C. ;
Muniyal, Balachandra .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :117-123
[5]  
Biswas S., 2018, International Journal of Pure and Applied Mathematics, V118, P101
[6]  
Broomhead D. S., 1988, Complex Systems, V2, P321
[7]  
Chand N, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), P40, DOI 10.1109/ICACCA.2016.7578859
[8]  
Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
[9]   A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks [J].
Dey, Saurabh ;
Ye, Qiang ;
Sampalli, Srinivas .
INFORMATION FUSION, 2019, 49 :205-215
[10]  
Dhanabal L, 2015, Int J Adv Res Comput Commun Eng, V4, P446, DOI DOI 10.17148/IJARCCE.2015.4696