Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

05.05.2018

Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers

verfasst von: Rania A. Ghazy, El-Sayed M. EL-Rabaie, Moawad I. Dessouky, Nawal A. El-Fishawy, Fathi E. Abd El-Samie

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the growth and benefits of network usage, securing the networks by using anomaly intrusion detection systems (IDS) against unknown intrusions has become an important issue. The first step of protecting any network is the detection of attacks. In this paper, we concentrate on four attacks; denial of service (DoS), probing, remote-to-local, and user-to-root attacks. We depend on features extracted from (NSL-KDD) dataset for these attacks. We investigate the performance of the attack detection process for several numbers of features using various subset-based feature selection techniques aiming to find the optimum collection of features for detecting each attack with an appropriate classifier. Simulation results reveal that redundant features can be eliminated from the attack detection process, and that we can determine the most useful set of features for a certain classifier, which enhances the IDS performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sen, S. (2015). Chapter 4: A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.CrossRef Sen, S. (2015). Chapter 4: A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.CrossRef
2.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Second IEEE symposium on computational intelligence. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Second IEEE symposium on computational intelligence.
4.
Zurück zum Zitat Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147–157.CrossRef Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147–157.CrossRef
5.
Zurück zum Zitat Zargar, G., & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259–271.CrossRef Zargar, G., & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259–271.CrossRef
7.
Zurück zum Zitat Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition, 42, 1330–1339.CrossRefMATH Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition, 42, 1330–1339.CrossRefMATH
8.
Zurück zum Zitat Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010). Feature selection: An eve evolving frontier in data mining. In: JMLR: Workshop and conference proceedings (Vol. 4, pp. 4–13). Publisher Citeseer. Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010). Feature selection: An eve evolving frontier in data mining. In: JMLR: Workshop and conference proceedings (Vol. 4, pp. 4–13). Publisher Citeseer.
9.
Zurück zum Zitat Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral dissertation, Department of Computer Science, University of Waikato. Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral dissertation, Department of Computer Science, University of Waikato.
10.
Zurück zum Zitat Thanah, H., Franke, K., & Pertovic, S. (2012). Chapter 2: Feature extraction methods for intrusion detection systems. In M. Gupta (Ed.), Threats countermeasures and advances in applied information security (pp. 23–52). IGI Global: Hershey. Thanah, H., Franke, K., & Pertovic, S. (2012). Chapter 2: Feature extraction methods for intrusion detection systems. In M. Gupta (Ed.), Threats countermeasures and advances in applied information security (pp. 23–52). IGI Global: Hershey.
11.
Zurück zum Zitat Vege, S. H. (2010). Ensemble of feature selection techniques for high dimensional data. Published Master’s thesis, Western Kentucky University. Vege, S. H. (2010). Ensemble of feature selection techniques for high dimensional data. Published Master’s thesis, Western Kentucky University.
12.
Zurück zum Zitat Wang, Y., & Makedon, F. (2004). Application of relief feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In: Computational systems bioinformatics conference, IEEE (pp. 497–498). Wang, Y., & Makedon, F. (2004). Application of relief feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In: Computational systems bioinformatics conference, IEEE (pp. 497–498).
13.
Zurück zum Zitat Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches. IJECSE, 1, 1044–1051. Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches. IJECSE, 1, 1044–1051.
14.
Zurück zum Zitat Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In: International conference on parallel (pp. 82–87). Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In: International conference on parallel (pp. 82–87).
Metadaten
Titel
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
verfasst von
Rania A. Ghazy
El-Sayed M. EL-Rabaie
Moawad I. Dessouky
Nawal A. El-Fishawy
Fathi E. Abd El-Samie
Publikationsdatum
05.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5662-0

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt