Intelligent feature selection and classification techniques for intrusion detection in networks: a survey

被引:0
|
作者
Sannasi Ganapathy
Kanagasabai Kulothungan
Sannasy Muthurajkumar
Muthusamy Vijayalakshmi
Palanichamy Yogesh
Arputharaj Kannan
机构
[1] Anna University,Department of Information Science and Technology, College of Engineering Guindy
关键词
Survey; Intrusion detection system; Neural networks; Fuzzy systems; Swarm intelligence; Particle swarm intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile computing, e-commerce, telecommunication, and network management. In this paper, a survey on intelligent techniques for feature selection and classification for intrusion detection in networks based on intelligent software agents, neural networks, genetic algorithms, neuro-genetic algorithms, fuzzy techniques, rough sets, and particle swarm intelligence has been proposed. These techniques have been useful for effectively identifying and preventing network intrusions in order to provide security to the Internet and to enhance the quality of service. In addition to the survey on existing intelligent techniques for intrusion detection systems, two new algorithms namely intelligent rule-based attribute selection algorithm for effective feature selection and intelligent rule-based enhanced multiclass support vector machine have been proposed in this paper.
引用
收藏
相关论文
共 50 条
  • [21] Review on intrusion detection using feature selection with machine learning techniques
    Kalimuthan, C.
    Renjit, J. Arokia
    MATERIALS TODAY-PROCEEDINGS, 2020, 33 : 3794 - 3802
  • [22] A new intrusion detection method using ensemble classification and feature selection
    Pooyan Azizi doost
    Sadegh Sarhani Moghadam
    Edris Khezri
    Ali Basem
    Mohammad Trik
    Scientific Reports, 15 (1)
  • [23] Supervised feature selection techniques in network intrusion detection: A critical review
    Di Mauro, M.
    Galatro, G.
    Fortino, G.
    Liotta, A.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
  • [24] TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
    Chkirbene, Zina
    Erbad, Aiman
    Hamila, Ridha
    Mohamed, Amr
    Guizani, Mohsen
    Hamdi, Mounir
    IEEE ACCESS, 2020, 8 : 95864 - 95877
  • [25] FS-SVM based intrusion detection feature selection and classification
    Zhang, Xueqin
    Gu, Chunhua
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 1084 - 1086
  • [26] Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection
    Salo, Fadi
    Injadat, MohammadNoor
    Moubayed, Abdallah
    Nassif, Ali Bou
    Essex, Aleksander
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 276 - 281
  • [27] Classification Method of Industrial Internet Intrusion Detection Based on Feature Selection
    Ren J.
    Zhang Y.
    Zhang B.
    Li S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1148 - 1159
  • [28] A Novel Cloud Intrusion Detection System Using Feature Selection and Classification
    Kannan, Anand
    Venkatesan, Karthik Gururajan
    Stagkopoulou, Alexandra
    Li, Sheng
    Krishnan, Sathyavakeeswaran
    Rahman, Arifur
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2015, 11 (04) : 1 - 15
  • [29] Intelligent Feature Selection Techniques for Pattern Classification of Lamb Wave Signals
    Hinders, Mark K.
    Miller, Corey A.
    40TH ANNUAL REVIEW OF PROGRESS IN QUANTITATIVE NONDESTRUCTIVE EVALUATION: INCORPORATING THE 10TH INTERNATIONAL CONFERENCE ON BARKHAUSEN NOISE AND MICROMAGNETIC TESTING, VOLS 33A & 33B, 2014, 1581 : 294 - 301
  • [30] An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
    Lin, Shih-Wei
    Ying, Kuo-Ching
    Lee, Chou-Yuan
    Lee, Zne-Jung
    APPLIED SOFT COMPUTING, 2012, 12 (10) : 3285 - 3290