Efficient Feature Selection for Intrusion Detection Systems

被引:0
作者
Ahmadi, S. Sareh [1 ]
Rashad, Sherif [1 ]
Elgazzar, Heba [1 ]
机构
[1] Morehead State Univ, Sch Engn & Comp Sci, Morehead, KY 40351 USA
来源
2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2019年
关键词
Intrusion detection systems; Machine learning; Feature selection; Dimensionality reduction; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) monitor network traffics to find suspicious activities, such as an attack or illegal activities. These systems play an important role in securing computer networks. Due to availability of irrelevant or redundant features and big dimensionality of network datasets which results to an inefficient detection process, this study, focused on identifying important attributes in order to build an effective IDS. A majority vote system, using three standard feature selection methods, Correlation-based feature selection, Information Gain, and Chi-square is proposed to select the most relevant features for IDS. The decision tree classifier is applied on reduced feature sets to build an intrusion detection system. The results show that selected reduced attributes from the novel feature selection system give a better performance for building a computationally efficient IDS system.
引用
收藏
页码:1029 / 1034
页数:6
相关论文
共 20 条
[1]   Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :842-851
[2]  
[Anonymous], 2009, P 2009 IEEE S COMP I
[3]  
Assi J.H., 2017, JORNAL ADV COMPUTER, V7, P15
[4]  
Boujnouni M. E., 2018, International Journal of Network Security, V20, P25
[5]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[6]  
Chae HeeSu., 2013, RECENT ADV COMPUTER, P184
[7]  
Dhanabal L, 2015, A study on NSL-KDD dataset for intrusion detection system based on classification algorithms
[8]   Intelligent feature selection and classification techniques for intrusion detection in networks: a survey [J].
Ganapathy, Sannasi ;
Kulothungan, Kanagasabai ;
Muthurajkumar, Sannasy ;
Vijayalakshmi, Muthusamy ;
Yogesh, Palanichamy ;
Kannan, Arputharaj .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
[9]  
Kantardzic M., 2011, Data Mining: Concepts, Models, Methods, and Algorithms, VSecond
[10]  
Kumar K., 2016, International Journal of Computer Applications, V150