Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

08.09.2017

A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions

verfasst von: J. Rene Beulah, D. Shalini Punithavathani

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet has become an essential aspect of communication in the day to day life of everyone around the world. With the increased usage of Internet, attacks have also increased and the need for various levels of security is on the rise, both in wired and wireless environments. Intrusion detection system (IDS) has become a mandatory level of security for organizations to protect themselves from intruders. Improving the accuracy of IDS is crucial and it is the present focus of researchers. Feature selection has its role in enhancing accuracy by extracting the most relevant features. This study proposes a hybrid method for feature selection that picks and combines the best features from different feature selection methods. This method can be applied for feature reduction in any application domain. In this work, the proposed hybrid method is employed for intrusion detection and six predominant features are picked from NSL-KDD dataset. An exhaustive performance investigation has proved that the proposed feature selection method increases the detection rate by 5% thereby improving the accuracy of intrusion detection system by 3%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 348, 243–271.CrossRef Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 348, 243–271.CrossRef
2.
Zurück zum Zitat Beulah, J. R., & Punithavathani, D. S. (2015). Simple hybrid feature selection (SHFS) for enhancing network intrusion detection with NSL-KDD dataset. International Journal of Applied Engineering Research, 10(19), 40498–40505. Beulah, J. R., & Punithavathani, D. S. (2015). Simple hybrid feature selection (SHFS) for enhancing network intrusion detection with NSL-KDD dataset. International Journal of Applied Engineering Research, 10(19), 40498–40505.
3.
Zurück zum Zitat Gu, S., Cheng, R., & Jin, Y. (2016). Feature selection for high-dimensional classification using a competitive swarm optimizer. Soft Computing, 1–12. Gu, S., Cheng, R., & Jin, Y. (2016). Feature selection for high-dimensional classification using a competitive swarm optimizer. Soft Computing, 1–12.
4.
Zurück zum Zitat Nguyen, H. T., Petrovic, S., & Franke, K. (2010). A Comparison of feature-selection methods for intrusion detection. In I. Kotenko & V. Skormin (Eds.), Computer Network Security Lecture Notes in Computer Science (pp. 242–255). Berlin: Springer.CrossRef Nguyen, H. T., Petrovic, S., & Franke, K. (2010). A Comparison of feature-selection methods for intrusion detection. In I. Kotenko & V. Skormin (Eds.), Computer Network Security Lecture Notes in Computer Science (pp. 242–255). Berlin: Springer.CrossRef
5.
Zurück zum Zitat Bennasar, M., Hicks, Y., & Setchi, R. (2015). Feature selection using joint mutual information maximisation. Expert Systems with Applications, 42(22), 8520–8532.CrossRef Bennasar, M., Hicks, Y., & Setchi, R. (2015). Feature selection using joint mutual information maximisation. Expert Systems with Applications, 42(22), 8520–8532.CrossRef
6.
Zurück zum Zitat Heba, F. E., Darwish, A., Hassanien, A. E., & Abraham, A. (2010). Principle components analysis and support vector machine based intrusion detection system. In 2010 10th international conference on intelligent systems design and applications (pp. 363–367). IEEE. Heba, F. E., Darwish, A., Hassanien, A. E., & Abraham, A. (2010). Principle components analysis and support vector machine based intrusion detection system. In 2010 10th international conference on intelligent systems design and applications (pp. 363–367). IEEE.
7.
Zurück zum Zitat Imran, H. M., Abdullah, A. B., Hussain, M., Palaniappan, S., & Ahmad, I. (2012). Intrusions detection based on optimum features subset and efficient dataset selection. International Journal of Engineering and Innovative Technology, 2(6), 265–270. Imran, H. M., Abdullah, A. B., Hussain, M., Palaniappan, S., & Ahmad, I. (2012). Intrusions detection based on optimum features subset and efficient dataset selection. International Journal of Engineering and Innovative Technology, 2(6), 265–270.
8.
Zurück zum Zitat Zhang, F., & Wang, D. (2013). An effective feature selection approach for network intrusion detection. In 2013 IEEE eighth international conference on networking, architecture and storage (NAS) (pp. 307–311). IEEE. Zhang, F., & Wang, D. (2013). An effective feature selection approach for network intrusion detection. In 2013 IEEE eighth international conference on networking, architecture and storage (NAS) (pp. 307–311). IEEE.
9.
Zurück zum Zitat Gupta, N., Singh, N., Sharma, V., Sharma, T., & Bhandari, A. S. (2013). Feature selection and classification of intrusion detection system using rough set. International Journal of Communication Network Security, 2, 20–23. Gupta, N., Singh, N., Sharma, V., Sharma, T., & Bhandari, A. S. (2013). Feature selection and classification of intrusion detection system using rough set. International Journal of Communication Network Security, 2, 20–23.
10.
Zurück zum Zitat Chae, H. S., Jo, B. O., Choi, S. H., & Park, T. (2015). Feature selection for intrusion detection using NSL-KDD. Recent Advances in Computer Science, ISBN, 978–960. Chae, H. S., Jo, B. O., Choi, S. H., & Park, T. (2015). Feature selection for intrusion detection using NSL-KDD. Recent Advances in Computer Science, ISBN, 978–960.
11.
Zurück zum Zitat Revathi, S., & Malathi, A. (2013). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research and Technology. ESRSA Publications. Revathi, S., & Malathi, A. (2013). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research and Technology. ESRSA Publications.
12.
Zurück zum Zitat Revathi, S., & Malathi, A. (2014). Network intrusion detection using hybrid simplified swarm optimization and random forest algorithm on Nsl-Kdd dataset. IJECS, 3, 3873–3876. Revathi, S., & Malathi, A. (2014). Network intrusion detection using hybrid simplified swarm optimization and random forest algorithm on Nsl-Kdd dataset. IJECS, 3, 3873–3876.
14.
Zurück zum Zitat Hasan, M. A. M., Nasser, M., Ahmad, S., & Molla, K. I. (2016). Feature selection for intrusion detection using random forest. Journal of Information Security, 7(03), 129.CrossRef Hasan, M. A. M., Nasser, M., Ahmad, S., & Molla, K. I. (2016). Feature selection for intrusion detection using random forest. Journal of Information Security, 7(03), 129.CrossRef
15.
Zurück zum Zitat Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: An update. ACM SIGKDD Explorations Newsletter, 11(1), 10–18.CrossRef Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: An update. ACM SIGKDD Explorations Newsletter, 11(1), 10–18.CrossRef
16.
Zurück zum Zitat Hall, M. A. (1999). Correlation-based feature selection for machine learning. Doctoral dissertation, The University of Waikato. Hall, M. A. (1999). Correlation-based feature selection for machine learning. Doctoral dissertation, The University of Waikato.
17.
Zurück zum Zitat Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques. Upper Saddle River: Elsevier.MATH Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques. Upper Saddle River: Elsevier.MATH
18.
Zurück zum Zitat Holte, R. C. (1993). Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11(1), 63–90.CrossRefMATH Holte, R. C. (1993). Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11(1), 63–90.CrossRefMATH
19.
Zurück zum Zitat Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data mining: Practical machine learning tools and techniques. Burlington: Morgan Kaufmann. Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data mining: Practical machine learning tools and techniques. Burlington: Morgan Kaufmann.
20.
Zurück zum Zitat Bouckaert, R. R. (2008). Bayesian network classifiers in weka for version 3-5-7. Artificial Intelligence Tools, 11(3), 369–387. Bouckaert, R. R. (2008). Bayesian network classifiers in weka for version 3-5-7. Artificial Intelligence Tools, 11(3), 369–387.
21.
Zurück zum Zitat Le Cessie, S., & Van Houwelingen, J. C. (1992). Ridge estimators in logistic regression. Applied Statistics, 191–201. Le Cessie, S., & Van Houwelingen, J. C. (1992). Ridge estimators in logistic regression. Applied Statistics, 191–201.
22.
Zurück zum Zitat Aha, D. W., Kibler, D., & Albert, M. K. (1991). Instance-based learning algorithms. Machine Learning, 6(1), 37–66. Aha, D. W., Kibler, D., & Albert, M. K. (1991). Instance-based learning algorithms. Machine Learning, 6(1), 37–66.
23.
Zurück zum Zitat Kohavi, R. (1996). Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid. In KDD (Vol. 96, pp. 202–207). Kohavi, R. (1996). Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid. In KDD (Vol. 96, pp. 202–207).
Metadaten
Titel
A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions
verfasst von
J. Rene Beulah
D. Shalini Punithavathani
Publikationsdatum
08.09.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4949-x

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt