Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

30.03.2022 | Research Article-Computer Engineering and Computer Science

A Multi-level Correlation-Based Feature Selection for Intrusion Detection

verfasst von: Mahendra Prasad, Rahul Kumar Gupta, Sachin Tripathi

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusions (or threats) have been considerably increased due to the rapid growth in Internet and network technologies. Nowadays, the world is moving more toward a digital world in this era of networks; it makes more vulnerable to attacks. Intrusion detection models have proved to be a robust method in achieving high security in the network. The detection capacity of the intrusion detection model depends on the training set. High-dimensional dataset increases complexities, higher resource utilization, and affects system accuracy. Many researchers have suggested intrusion detection methods with reduced dimensions training set. However, they have not applied the multi-level-based correlation among attributes. This paper analyzed the network data and proposed a multi-level correlation-based feature selection method. It selects significant features and reduces the size of the training set. We have applied a classifier that learns from the training set and detects attacks; the proposed method enhanced the detection capacity. This work provides a detailed analysis of the UNSW-NB’15 dataset with binary classes (normal and attack) and multi-classes (normal and attack categories); it also shows the effectiveness of the UNSW-NB’15 dataset, which maintains a high category. The proposed method is executed on a high-dimensional dataset UNSW-NB’15. Finally, the experimental results are compared with existing techniques that show the better performance of the proposed method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmed, M.; Mahmood, A.N.; Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef Ahmed, M.; Mahmood, A.N.; Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef
2.
Zurück zum Zitat Sommer, R.; Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305–316. IEEE (2010) Sommer, R.; Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305–316. IEEE (2010)
3.
Zurück zum Zitat Gottwalt, F.; Karduck, A.P.: Sim in light of big data. In: 2015 11th International Conference on Innovations in Information Technology (IIT), pp. 326–331. IEEE (2015) Gottwalt, F.; Karduck, A.P.: Sim in light of big data. In: 2015 11th International Conference on Innovations in Information Technology (IIT), pp. 326–331. IEEE (2015)
4.
Zurück zum Zitat Thakare, S.S.; Kaur, P.: Denial-of-service attack detection system. In: 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), pp. 281–285. IEEE (2017) Thakare, S.S.; Kaur, P.: Denial-of-service attack detection system. In: 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), pp. 281–285. IEEE (2017)
5.
Zurück zum Zitat Tan, Z.; Jamdagni, A.; He, X.; Nanda, P.; Liu, R.P.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447–456 (2013) Tan, Z.; Jamdagni, A.; He, X.; Nanda, P.; Liu, R.P.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447–456 (2013)
6.
Zurück zum Zitat Ye, N.; Emran, S.M.; Chen, Q.; Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51(7), 810–820 (2002)CrossRef Ye, N.; Emran, S.M.; Chen, Q.; Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51(7), 810–820 (2002)CrossRef
7.
Zurück zum Zitat Gottwalt, F.; Waller, A.; Liu, W.: Natural laws as a baseline for network anomaly detection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370–377. IEEE (2016) Gottwalt, F.; Waller, A.; Liu, W.: Natural laws as a baseline for network anomaly detection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370–377. IEEE (2016)
8.
Zurück zum Zitat Yeung, D.S.; Jin, S.; Wang, X.: Covariance-matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 37(2), 157–169 (2007)CrossRef Yeung, D.S.; Jin, S.; Wang, X.: Covariance-matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 37(2), 157–169 (2007)CrossRef
9.
Zurück zum Zitat Ring, M.; Wunderlich, S.; Scheuring, D.; Landes, D.; Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147–167 (2019)CrossRef Ring, M.; Wunderlich, S.; Scheuring, D.; Landes, D.; Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147–167 (2019)CrossRef
10.
Zurück zum Zitat Moustafa, N.; Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015) Moustafa, N.; Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)
11.
Zurück zum Zitat Ring, M.; Wunderlich, S.; Grüdl, D.; Landes, D.; Hotho, A.: Flow-based benchmark data sets for intrusion detection. In: Proceedings of the 16th European Conference on Cyber Warfare and Security, pp. 361–369 (2017) Ring, M.; Wunderlich, S.; Grüdl, D.; Landes, D.; Hotho, A.: Flow-based benchmark data sets for intrusion detection. In: Proceedings of the 16th European Conference on Cyber Warfare and Security, pp. 361–369 (2017)
12.
Zurück zum Zitat Prasad, M.; Tripathi, S.; Dahal, K.: Intrusion detection in ad hoc network using machine learning technique. In: International Conference on Big Data, Machine Learning, and Applications, pp. 60–71. Springer (2019) Prasad, M.; Tripathi, S.; Dahal, K.: Intrusion detection in ad hoc network using machine learning technique. In: International Conference on Big Data, Machine Learning, and Applications, pp. 60–71. Springer (2019)
13.
Zurück zum Zitat Prasad, M.; Tripathi, S.; Dahal, K.: Wormhole attack detection in ad hoc network using machine learning technique. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2019) Prasad, M.; Tripathi, S.; Dahal, K.: Wormhole attack detection in ad hoc network using machine learning technique. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2019)
14.
Zurück zum Zitat Li, Q.; Tan, Z.; Jamdagni, A.; Nanda, P.; He, X.; Han, W.: An intrusion detection system based on polynomial feature correlation analysis. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 978–983. IEEE (2017) Li, Q.; Tan, Z.; Jamdagni, A.; Nanda, P.; He, X.; Han, W.: An intrusion detection system based on polynomial feature correlation analysis. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 978–983. IEEE (2017)
15.
Zurück zum Zitat Nychis, G.; Sekar, V.; Andersen, D.G.; Kim, H.; Zhang, H.: An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, pp. 151–156 (2008) Nychis, G.; Sekar, V.; Andersen, D.G.; Kim, H.; Zhang, H.: An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, pp. 151–156 (2008)
16.
Zurück zum Zitat Ambusaidi, M.A.; He, X.; Nanda, P.; Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)MathSciNetCrossRef Ambusaidi, M.A.; He, X.; Nanda, P.; Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)MathSciNetCrossRef
17.
Zurück zum Zitat Moustafa, N.; Slay, J.; Creech, G.: Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans. Big Data 5(4), 481–494 (2017)CrossRef Moustafa, N.; Slay, J.; Creech, G.: Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans. Big Data 5(4), 481–494 (2017)CrossRef
18.
Zurück zum Zitat Khammassi, C.; Krichen, S.: A ga-lr wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255–277 (2017) Khammassi, C.; Krichen, S.: A ga-lr wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255–277 (2017)
19.
Zurück zum Zitat Benmessahel, I.; Xie, K.; Chellal, M.; Semong, T.: A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol. Intell. 12(2), 131–146 (2019) Benmessahel, I.; Xie, K.; Chellal, M.; Semong, T.: A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol. Intell. 12(2), 131–146 (2019)
20.
Zurück zum Zitat Gottwalt, F.; Chang, E.; Dillon, T.: Corrcorr: A feature selection method for multivariate correlation network anomaly detection techniques. Comput. Secur. 83, 234–245 (2019)CrossRef Gottwalt, F.; Chang, E.; Dillon, T.: Corrcorr: A feature selection method for multivariate correlation network anomaly detection techniques. Comput. Secur. 83, 234–245 (2019)CrossRef
21.
Zurück zum Zitat Kasongo, S.M.; Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92, 101752 (2020)CrossRef Kasongo, S.M.; Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92, 101752 (2020)CrossRef
22.
Zurück zum Zitat Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009) Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009)
23.
Zurück zum Zitat Moustafa, N.; Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J. A Glob. Perspect. 25(1–3), 18–31 (2016)CrossRef Moustafa, N.; Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J. A Glob. Perspect. 25(1–3), 18–31 (2016)CrossRef
24.
Zurück zum Zitat Prasad, M.; Tripathi, S.; Dahal, K.: An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 105980 (2020)CrossRef Prasad, M.; Tripathi, S.; Dahal, K.: An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 105980 (2020)CrossRef
25.
Zurück zum Zitat Prasad, M.; Tripathi, S.; Dahal, K.: Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput. Secur. 99, 102062 (2020)CrossRef Prasad, M.; Tripathi, S.; Dahal, K.: Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput. Secur. 99, 102062 (2020)CrossRef
26.
Zurück zum Zitat Moustafa, N.; Creech, G.; Slay, J. Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models. In: Data Analytics and Decision Support for Cybersecurity, pp. 127–156. Springer (2017) Moustafa, N.; Creech, G.; Slay, J. Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models. In: Data Analytics and Decision Support for Cybersecurity, pp. 127–156. Springer (2017)
27.
Zurück zum Zitat Muna, A.-H.; Moustafa, N.; Sitnikova, E.: Identification of malicious activities in industrial internet of things based on deep learning models. J. Inf. Secur. Appl. 41, 1–11 (2018) Muna, A.-H.; Moustafa, N.; Sitnikova, E.: Identification of malicious activities in industrial internet of things based on deep learning models. J. Inf. Secur. Appl. 41, 1–11 (2018)
Metadaten
Titel
A Multi-level Correlation-Based Feature Selection for Intrusion Detection
verfasst von
Mahendra Prasad
Rahul Kumar Gupta
Sachin Tripathi
Publikationsdatum
30.03.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-022-06760-2

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Transformer-Based Word Embedding With CNN Model to Detect Sarcasm and Irony

Research Article-Computer Engineering and Computer Science

C-COVIDNet: A CNN Model for COVID-19 Detection Using Image Processing

Research Article-Computer Engineering and Computer Science

Arabic Handwritten Recognition Using Deep Learning: A Survey

Research Article-Computer Engineering and Computer Science

Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.