Skip to main content
Top

2016 | OriginalPaper | Chapter

A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System

Authors : Shilpa Bahl, Sudhir Kumar Sharma

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The intrusion detection system (IDS) research field has grown tremendously in the past decade. Current IDS uses all data features to detect intrusions. Some of the features may be irrelevant and redundant to the detection process. The purpose of this study is to identify a minimal subset of relevant features to design effective intrusion detection system. A proposed minimal subset of features is built by selecting common features from six search methods with correlation feature selection method. The paper presents empirical comparison between 7 reduced subsets and the given complete set of features. The simulation results have shown slightly better performance using only 12 proposed features compared to others.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Van der Geer, J., et al.: Intrusion detection system: a review, the art of writing a scientific article. J. Sci. Commun. 163, 51–59 (2000) Van der Geer, J., et al.: Intrusion detection system: a review, the art of writing a scientific article. J. Sci. Commun. 163, 51–59 (2000)
2.
go back to reference Van der Geer, J., et al.: Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer (2006) Van der Geer, J., et al.: Managing Cyber Threats: Issues, Approaches, and Challenges, vol. 5. Springer (2006)
3.
go back to reference Han, J., Kamber, M., Pei, J.: Data Mining, Concepts and Techniques. Southeast Asia Edition (2006) Han, J., Kamber, M., Pei, J.: Data Mining, Concepts and Techniques. Southeast Asia Edition (2006)
4.
go back to reference Tavallaee, M., Stakhanova, N., Ghorbani, A.A.: Toward credible evaluation of anomaly-based intrusion-detection methods. Syst. Man Cybern. Part C: IEEE Trans. Appl. Rev. 40(5), 516–524 (2010)CrossRef Tavallaee, M., Stakhanova, N., Ghorbani, A.A.: Toward credible evaluation of anomaly-based intrusion-detection methods. Syst. Man Cybern. Part C: IEEE Trans. Appl. Rev. 40(5), 516–524 (2010)CrossRef
5.
go back to reference Sánchez, R., Herrero, Á., Corchado, E.: Visualization and clustering for SNMP intrusion detection. Cybern. Syst. 44(6–7), 505–532 (2013)CrossRef Sánchez, R., Herrero, Á., Corchado, E.: Visualization and clustering for SNMP intrusion detection. Cybern. Syst. 44(6–7), 505–532 (2013)CrossRef
8.
go back to reference Revathi, S., Malathi, A.: A detailed analysis of KDD cup99 dataset for IDS. Int. J. Eng. Res. Technol. (IJERT) 2(12), (2013) Revathi, S., Malathi, A.: A detailed analysis of KDD cup99 dataset for IDS. Int. J. Eng. Res. Technol. (IJERT) 2(12), (2013)
9.
go back to reference Nguyen, H., Choi, D.: Application of data mining to network intrusion detection: classifier selection model. In: APNOMS 2008, LNCS 5297, pp. 399–408, 2008. © Springer, Berlin Heidelberg (2008) Nguyen, H., Choi, D.: Application of data mining to network intrusion detection: classifier selection model. In: APNOMS 2008, LNCS 5297, pp. 399–408, 2008. © Springer, Berlin Heidelberg (2008)
10.
go back to reference Bahl, S., Sharma, S.K.: Improving classification accuracy of IDS using feature subset selection. In: Proceedings of International Conference IEEE ACCT 2015, India Bahl, S., Sharma, S.K.: Improving classification accuracy of IDS using feature subset selection. In: Proceedings of International Conference IEEE ACCT 2015, India
11.
go back to reference Sabhnani, M., Serpen, G.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: MLMTA, pp. 209–215 (2003) Sabhnani, M., Serpen, G.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: MLMTA, pp. 209–215 (2003)
12.
go back to reference Sabhnani, M., Serpen, G.: Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set. Intel. Data Anal. 8(4), 403–415 (2004) Sabhnani, M., Serpen, G.: Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set. Intel. Data Anal. 8(4), 403–415 (2004)
13.
go back to reference Chizi, B., Maimon, O.: Dimension reduction and feature selection. In: Data Mining and Knowledge Discovery Handbook, pp. 83–100. Springer (2010) Chizi, B., Maimon, O.: Dimension reduction and feature selection. In: Data Mining and Knowledge Discovery Handbook, pp. 83–100. Springer (2010)
14.
go back to reference Maaten, V., Laurens, J.P., Postma, E.O., Jaap, H., Herik, V.: Dimensionality reduction: a comparative review. J. Mach. Learn. Res. 10(1–41), 66–71 (2009) Maaten, V., Laurens, J.P., Postma, E.O., Jaap, H., Herik, V.: Dimensionality reduction: a comparative review. J. Mach. Learn. Res. 10(1–41), 66–71 (2009)
15.
go back to reference Stańczyk, U.: Ranking of characteristic features in combined wrapper approaches to selection. Neural Comput. Appl. 1–16 (2015) Stańczyk, U.: Ranking of characteristic features in combined wrapper approaches to selection. Neural Comput. Appl. 1–16 (2015)
16.
go back to reference Jiliang, T., Alelyani, S., Liu, H.: Feature selection for classification: a review. In: Aggarwal, C. (ed.) Data Classification: Algorithms and Applications. CRC Press in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series (2014) Jiliang, T., Alelyani, S., Liu, H.: Feature selection for classification: a review. In: Aggarwal, C. (ed.) Data Classification: Algorithms and Applications. CRC Press in Chapman & Hall/CRC Data Mining and Knowledge Discovery Series (2014)
17.
go back to reference Solanki, M., Dhamdhere, V.: Intrusion detection technique using data mining approach: survey. Int. J. Innovative Res. Comput. Commun. Eng. 2(11), (2014) Solanki, M., Dhamdhere, V.: Intrusion detection technique using data mining approach: survey. Int. J. Innovative Res. Comput. Commun. Eng. 2(11), (2014)
18.
go back to reference Engen, V., et al.: Exploring discrepancies in findings obtained with the KDD Cup’99 data set. Intell. Data Anal. 15(2), 251–276 (2011) Engen, V., et al.: Exploring discrepancies in findings obtained with the KDD Cup’99 data set. Intell. Data Anal. 15(2), 251–276 (2011)
19.
go back to reference Piramuthu, S.: Evaluating feature selection methods for learning in data mining applications. Eur. J. Oper. Res. 156, 483–494 (2004)MATHCrossRef Piramuthu, S.: Evaluating feature selection methods for learning in data mining applications. Eur. J. Oper. Res. 156, 483–494 (2004)MATHCrossRef
20.
go back to reference Zaman, S., Karray, F.: Features selection for intrusion detection systems based on support vector machines. In: Consumer Communications and Networking Conference, CCNC 2009 IEEE, pp. 1–8 Zaman, S., Karray, F.: Features selection for intrusion detection systems based on support vector machines. In: Consumer Communications and Networking Conference, CCNC 2009 IEEE, pp. 1–8
21.
go back to reference Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114–132 (2007)CrossRef Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114–132 (2007)CrossRef
22.
go back to reference Staudemeyer, R.C., Omlin, C.W.: Extracting salient features for network intrusion detection using machine learning methods. S. Afr. Comput. J. 52, 82–96 (2014) Staudemeyer, R.C., Omlin, C.W.: Extracting salient features for network intrusion detection using machine learning methods. S. Afr. Comput. J. 52, 82–96 (2014)
24.
go back to reference Witten, I.H., Frank, E., Hall, M.A.: Data Mining-Practical Machine Learning Tools and Techniques. Morgan Kaufmann (2011) Witten, I.H., Frank, E., Hall, M.A.: Data Mining-Practical Machine Learning Tools and Techniques. Morgan Kaufmann (2011)
25.
go back to reference Hall, M.A.: Correlation-based Feature Selection for Machine Learning, Thesis (1999) Hall, M.A.: Correlation-based Feature Selection for Machine Learning, Thesis (1999)
Metadata
Title
A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System
Authors
Shilpa Bahl
Sudhir Kumar Sharma
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2523-2_32