Feature Selection for Modeling Intrusion Detection

Full Text (PDF, 554KB), PP.56-62

Views: 0 Downloads: 0

Author(s)

Virendra Barot 1,* Sameer Singh Chauhan 1 Bhavesh Patel 1

1. I.T. Department, Sardar Vallabhbhai Patel Institute of Technology, Vasad -388306, Gujarat, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.07.08

Received: 16 Jul. 2013 / Revised: 11 Dec. 2013 / Accepted: 19 Feb. 2014 / Published: 8 Jun. 2014

Index Terms

Feature selection, network intrusion detection system, decision table majority, naive Bayesian classification

Abstract

Feature selection is always beneficial to the field like Intrusion Detection, where vast amount of features extracted from network traffic needs to be analysed. All features extracted are not informative and some of them are redundant also. We investigated the performance of three feature selection algorithms Chi-square, Information Gain based and Correlation based with Naive Bayes (NB) and Decision Table Majority Classifier. Empirical results show that significant feature selection can help to design an IDS that is lightweight, efficient and effective for real world detection systems.

Cite This Paper

Virendra Barot, Sameer Singh Chauhan, Bhavesh Patel, "Feature Selection for Modeling Intrusion Detection", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.7, pp.56-62, 2014. DOI:10.5815/ijcnis.2014.07.08

Reference

[1]Aleksanda Lazarevic, L. Ertoz, Aysel Ozgur, Jaideep Srivastava and Vipin Kumar, “A Comparative Study of Anomaly Detection Schemes in the Network Intrusion Detection”, in Proceedings of Society for Industrial and Applied Mathematics, (SIAM) Conference on Data Mining, 2003.
[2]Joseph Derrick, Richard W. Tibbs, Larry Lee Reynolds,”Investigating new approaches to data collection, management and analysis for nework intrusion detection”, Proceeding of the 45th annual south east regional conference, DOI = http://dl.acm.org/citation.cfm?doid = 1233341.1233392, 2007.
[3]Wenke Lee, Salvotore J. Stolfo and Kui W. Mok, “A Data Mining Framework for Building Intrusion Detection Model, Security and Privacy”, Proceedings of the 1999 IEEE Symposium, pages 120-132, 1999.
[4]E. Eskin, A. Arnold, M. Preau, L.Portnoy, and S. Stolfo, “A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data”. Applications of Data Mining in Computer Society, Kluwer Academic Publishers, 2002.
[5]Lee W., Stolfo S. and Mok K., “A Data Mining framework for Building Intrusion Detection Models”, In Proceedings of the IEEE Symposium on Security and Privacy, 1999.
[6]Luo J. and Bridges S. M., “Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection,” International Journal of Intelligent Systems, (IJIS), John Wiley & Sons,Vol. 15, No. 8, pp. 687-704, 2000.
[7]B. A. Nahla, B. Salem, and E. Zied, “Naive bayes vs decision trees in intrusion detection systems”, In Proceeding of the ACM Symposium on Applied Computing, Nicosia, Cyprus, 2004.
[8]A. H. Sung, S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks”, Symposium on Applications and the Internet, 2003.
[9]Mukkamala S., Sung A.H. and Abraham A., “Intrusion Detection Using Ensemble of Soft Computing Paradigms”, Third International Conference on Intelligent Systems Design and Applications, Springer Verlag Germany, pp. 239-248, 2003.
[10]Hongjie Liu, Boqin feng, jianjie weng, “An Effective Data Classification Algorithm Based on the Decision Table”, Seventh IEEE Association for Computer and Information Science(ACIS) International Conference on Computer and Information Science, 2008.
[11]Jashan Koshal, Monark Bag, “Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System”, in International Journal of Computer Network and Information Security (IJCNS), Vol. 4, pp 8-20, August 2012.
[12]Ron Kohavi, “The power of decision Tables”, in 8th European conference on Machine learning, pp.174-189, 1995.
[13]Y. Yang and J. Pedersen, “A comparative study on feature selection in text categorization”, pp. 412–420, ICML, 1997.
[14]H. Liu and, R. Setiono.Chi2 , “Feature selection and discritization of numeric attributes, Proc. IEEE 7th International Conference on Tools with Artificial Intelligence, pp. 338-391, 1995.
[15]M. A. Hall, L. A. Smith, “Feature selection for machine learning: comparing a correlation-based filter approach to the wrapper”, in Proceedings of Florida Artificial Intelligence Research Symposium, Orlando, FL, 1999, pp. 235–239.
[16]R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. 2nd edition, 2004.
[17]KDD (1999). Available at http:// kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
[18]http://weka.wikispaces.com/Eclipse/Eclipse+3.4.x+(weka-src.jar).
[19]http://www.cs.waikato.ac.nz/ml/weka/docummentation.html.