Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection

被引:13
作者
Ghazy, Rania A. [1 ]
El-Rabaie, El-Sayed M. [2 ]
Dessouky, Moawad I. [2 ]
El-Fishawy, Nawal A. [3 ]
Abd El-Samie, Fathi E. [2 ]
机构
[1] Univ Sadat City, El Sadat City, Egypt
[2] Menoufia Univ, Fac Elect Engn, Dept Elect & Elect Commun Engn, Menoufia 32952, Egypt
[3] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
关键词
Feature selection; Intrusion detection; Classifiers; Network attacks;
D O I
10.1007/s11277-019-06864-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper investigates the performance of different feature selection techniques such as ranking and subset-based techniques, aiming to find the optimum collection of features to detect attacks with an appropriate classifier. The results reveal that more accuracy of detection and less false alarms are obtained after eliminating the redundant features and determining the most useful set of features, which increases the intrusion detection system (IDS) performance.
引用
收藏
页码:375 / 393
页数:19
相关论文
共 50 条
[21]   Feature subset selection and ranking for data dimensionality reduction [J].
Wei, Hua-Liang ;
Billings, Stephen A. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (01) :162-166
[22]   A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things [J].
Arun Kumar Sangaiah ;
Amir Javadpour ;
Forough Ja’fari ;
Pedro Pinto ;
Weizhe Zhang ;
Sudha Balasubramanian .
Cluster Computing, 2023, 26 :599-612
[23]   A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things [J].
Sangaiah, Arun Kumar ;
Javadpour, Amir ;
Ja'fari, Forough ;
Pinto, Pedro ;
Zhang, Weizhe ;
Balasubramanian, Sudha .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01) :599-612
[24]   Genetic algorithm with Different Feature Selection Method for Intrusion Detection [J].
Cleetus, Nimmy ;
Dhanya, K. A. .
2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, :220-225
[25]   Machine learning-based intrusion detection: feature selection versus feature extraction [J].
Ngo, Vu-Duc ;
Vuong, Tuan-Cuong ;
Van Luong, Thien ;
Tran, Hung .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03) :2365-2379
[26]   Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System [J].
Singh, Devendra Kumar ;
Shrivastava, Manish .
ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (03) :7130-7134
[27]   Feature selection for intrusion detection based on an improved rime optimization algorithm [J].
Peng, Qingyuan ;
Wang, Xiaofeng ;
Tang, Ao .
MCB Molecular and Cellular Biomechanics, 2024, 21 (03)
[28]   On the Performance of GRASP-Based Feature Selection for CPS Intrusion Detection [J].
Quincozes, Silvio Ereno ;
Mosse, Daniel ;
Passos, Diego ;
Albuquerque, Celio ;
Ochi, Luiz Satoru ;
dos Santos, Vinicius Figueiredo .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01) :614-626
[29]   TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection [J].
Chkirbene, Zina ;
Erbad, Aiman ;
Hamila, Ridha ;
Mohamed, Amr ;
Guizani, Mohsen ;
Hamdi, Mounir .
IEEE ACCESS, 2020, 8 :95864-95877
[30]   FS-SVM based intrusion detection feature selection and classification [J].
Zhang, Xueqin ;
Gu, Chunhua .
DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, :1084-1086