Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

05.11.2019

Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection

verfasst von: Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Fishawy, Fathi E. Abd El-Samie

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper investigates the performance of different feature selection techniques such as ranking and subset-based techniques, aiming to find the optimum collection of features to detect attacks with an appropriate classifier. The results reveal that more accuracy of detection and less false alarms are obtained after eliminating the redundant features and determining the most useful set of features, which increases the intrusion detection system (IDS) performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sen, S. (2015). A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.CrossRef Sen, S. (2015). A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.CrossRef
2.
Zurück zum Zitat Gyanchandani, M., Yadav, R. N., & Rana, J. L. (2010). Intrusion detection using C4. 5: performance enhancement by classifier combination. International Journal on Signal and Image Processing,1(03), 46–49. Gyanchandani, M., Yadav, R. N., & Rana, J. L. (2010). Intrusion detection using C4. 5: performance enhancement by classifier combination. International Journal on Signal and Image Processing,1(03), 46–49.
3.
Zurück zum Zitat Garg, T., & Khurana, S. S. (2014). Comparison of classification techniques for intrusion detection dataset using WEKA. In International conference on recent advances and innovations in engineering (ICRAIE-2014) (pp. 1–5). IEEE. Garg, T., & Khurana, S. S. (2014). Comparison of classification techniques for intrusion detection dataset using WEKA. In International conference on recent advances and innovations in engineering (ICRAIE-2014) (pp. 1–5). IEEE.
4.
Zurück zum Zitat Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In International conference on parallel (pp. 82–87). Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In International conference on parallel (pp. 82–87).
5.
Zurück zum Zitat Tavallaee, M., & Bagheri, E., Lu, W., & Ghorbani, A. (2009) A detailed analysis of the KDD CUP 99 dataset. In The second IEEE symposium on computational intelligence. Tavallaee, M., & Bagheri, E., Lu, W., & Ghorbani, A. (2009) A detailed analysis of the KDD CUP 99 dataset. In The second IEEE symposium on computational intelligence.
7.
Zurück zum Zitat Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC),5(4), 147–157.CrossRef Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC),5(4), 147–157.CrossRef
8.
Zurück zum Zitat Zargar, Gh, & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security,3, 259–271.CrossRef Zargar, Gh, & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security,3, 259–271.CrossRef
10.
Zurück zum Zitat Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition,42, 1330–1339.CrossRef Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition,42, 1330–1339.CrossRef
11.
Zurück zum Zitat Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010) Feature selection: An eve evolving frontier in data mining. In Workshop and conference proceedings (Vol. 4, pp. 4–13), Publisher Citeseer. Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010) Feature selection: An eve evolving frontier in data mining. In Workshop and conference proceedings (Vol. 4, pp. 4–13), Publisher Citeseer.
12.
Zurück zum Zitat Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral Dissertation, Department of Computer Science, University of Waikato. Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral Dissertation, Department of Computer Science, University of Waikato.
13.
Zurück zum Zitat Thanah, H., Franke, K. S. (2012). Pertovic feature extraction methods for intrusion detection systems. In Threats countermeasures and advances in applied information security (pp. 23–52). Thanah, H., Franke, K. S. (2012). Pertovic feature extraction methods for intrusion detection systems. In Threats countermeasures and advances in applied information security (pp. 23–52).
14.
Zurück zum Zitat Sri Harsha, V. (2010). Ensemble of feature selection techniques for high dimensional data Published Master’s Thesis. Western Kentucky University. Sri Harsha, V. (2010). Ensemble of feature selection techniques for high dimensional data Published Master’s Thesis. Western Kentucky University.
15.
Zurück zum Zitat Wang, Y., & Makedon, F. (2004). Application of relief-F feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In Proceedings 2004 IEEE computational systems bioinformatics conference, 2004. CSB 2004. (pp. 497–498). IEEE. Wang, Y., & Makedon, F. (2004). Application of relief-F feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In Proceedings 2004 IEEE computational systems bioinformatics conference, 2004. CSB 2004. (pp. 497–498). IEEE.
16.
Zurück zum Zitat Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches, IJECSE. Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches, IJECSE.
Metadaten
Titel
Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection
verfasst von
Rania A. Ghazy
El-Sayed M. El-Rabaie
Moawad I. Dessouky
Nawal A. El-Fishawy
Fathi E. Abd El-Samie
Publikationsdatum
05.11.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06864-3

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt