Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection

被引:13
作者
Ghazy, Rania A. [1 ]
El-Rabaie, El-Sayed M. [2 ]
Dessouky, Moawad I. [2 ]
El-Fishawy, Nawal A. [3 ]
Abd El-Samie, Fathi E. [2 ]
机构
[1] Univ Sadat City, El Sadat City, Egypt
[2] Menoufia Univ, Fac Elect Engn, Dept Elect & Elect Commun Engn, Menoufia 32952, Egypt
[3] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
关键词
Feature selection; Intrusion detection; Classifiers; Network attacks;
D O I
10.1007/s11277-019-06864-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper investigates the performance of different feature selection techniques such as ranking and subset-based techniques, aiming to find the optimum collection of features to detect attacks with an appropriate classifier. The results reveal that more accuracy of detection and less false alarms are obtained after eliminating the redundant features and determining the most useful set of features, which increases the intrusion detection system (IDS) performance.
引用
收藏
页码:375 / 393
页数:19
相关论文
共 50 条
[41]   Sequential classifiers for network intrusion detection based on data selection process [J].
Corrales, David Camilo ;
Corrales, Juan Carlos ;
Sanchis, Araceli ;
Ledezma, Agapito .
2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, :1827-1832
[42]   Comparative Analysis of Filter Feature Selection Techniques with Different Classifiers for Image Steganalysis [J].
Adlakha, Aditi ;
Chhikara, Rita Rana .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, :1122-1127
[43]   Bias and stability of single variable classifiers for feature ranking and selection [J].
Fakhraei, Shobeir ;
Soltanian-Zadeh, Hamid ;
Fotouhi, Farshad .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (15) :6945-6958
[44]   Gene expression Data Analyses for Supervised Prostate Cancer Classification based on Feature Subset Selection Combined with Different Classifiers [J].
Bouazza, Sara Haddou ;
Zeroual, Abdelouhab ;
Auhmani, Khalid .
PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, :163-168
[45]   An Ensemble Classifier Approach on Different Feature Selection Methods for Intrusion Detection [J].
Vinutha, H. P. ;
Poornima, B. .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 :442-451
[46]   A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection [J].
Makki, Widad Mirghani ;
Siraj, Maheyzah M. D. ;
Ibrahim, Nurudeen Mahmud .
EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 :779-788
[47]   An Intrusion Detection Mothod based on Feature Selection and Binary Classification Grouped Learning [J].
Gao, Xueqin ;
Wang, Tao ;
Wu, Qian ;
Wu, Jiehu .
2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, :1723-1730
[48]   An Improved Feature Selection Algorithm Based on MAHALANOBIS Distance for Network Intrusion Detection [J].
Zhao Yongli ;
Zhang Yungui ;
Tong Weiming ;
Chen Hongzhi .
2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, :69-73
[49]   Two-level feature selection method based on SVM for intrusion detection [J].
Wu, Xiao-Nian ;
Peng, Xiao-Jin ;
Yang, Yu-Yang ;
Fang, Kun .
Tongxin Xuebao/Journal on Communications, 2015, 36 (04)
[50]   A feature selection algorithm for intrusion detection system based on the enhanced heuristic optimizer [J].
Yu, Hongchen ;
Zhang, Wei ;
Kang, Chunying ;
Xue, Yankun .
EXPERT SYSTEMS WITH APPLICATIONS, 2025, 265