A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System

被引:8
作者
Bahl, Shilpa [1 ]
Sharma, Sudhir Kumar [1 ]
机构
[1] KIIT Coll Engn, Gurgaon, India
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 2 | 2016年 / 380卷
关键词
Correlation feature selection; Intrusion detection system; Machine learning; User to root attack class;
D O I
10.1007/978-81-322-2523-2_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The intrusion detection system (IDS) research field has grown tremendously in the past decade. Current IDS uses all data features to detect intrusions. Some of the features may be irrelevant and redundant to the detection process. The purpose of this study is to identify a minimal subset of relevant features to design effective intrusion detection system. A proposed minimal subset of features is built by selecting common features from six search methods with correlation feature selection method. The paper presents empirical comparison between 7 reduced subsets and the given complete set of features. The simulation results have shown slightly better performance using only 12 proposed features compared to others.
引用
收藏
页码:337 / 346
页数:10
相关论文
共 23 条
[1]  
[Anonymous], NEURAL COMPUT APPL
[2]  
[Anonymous], 2014, S AFR COMPUT J
[3]  
[Anonymous], 2011, Pei. data mining concepts and techniques, DOI 10.1016/C2009-0-61819-5
[4]  
Bahl S., 2015, P INT C IEEE ACCT 20
[5]  
Chizi B, 2010, DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK, SECOND EDITION, P83, DOI 10.1007/978-0-387-09823-4_5
[6]  
Engen Vegard, 2011, Intelligent Data Analysis, V15, P251, DOI 10.3233/IDA-2010-0466
[7]  
Hall M.A., 1999, P 17 INT C MACHINE L, P359
[8]  
Jiliang T., 2014, DATA MINING KNOWLEDG
[9]  
Nguyen HA, 2008, LECT NOTES COMPUT SC, V5297, P399, DOI 10.1007/978-3-540-88623-5_41
[10]   Modeling intrusion detection system using hybrid intelligent systems [J].
Peddabachigari, Sandhya ;
Abraham, Ajith ;
Grosan, Crina ;
Thomas, Johnson .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :114-132