Skip to main content
Log in

An IWD-based feature selection method for intrusion detection system

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Intrusion detection system (IDS) is an essential cyber security tool which is used to detect abnormal activity on a network or a host. A general approach towards designing IDS models is to use classifiers as detection units. But a large feature space including noisy, redundant and irrelevant features often leads to low detection and high misclassification rates by the classifier. To address this drawback, the process of selecting most relevant key features for classification is highly important. The objective of this work is to optimize the process of feature selection in a way that improves the accuracy of the classifier. This paper presents an IDS model wherein an intelligent water drops (IWD) algorithm-based feature selection method is proposed. This method uses the IWD algorithm, a nature-inspired optimization algorithm for the feature subset selection along with support vector machine as a classifier for evaluation of the features selected. The experiments are conducted using KDD CUP’99 dataset, and the performance is compared with earlier designs. The experimental results show that the proposed model performs better in terms of higher detection rate, low false alarm rate and improved accuracy than the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Aghdam MH, Kabiri P (2016) Feature selection for intrusion detection system using ant colony optimization. Int J Netw Secur 18(3):420–432

    Google Scholar 

  • Alijla BO, Peng LC, Khader AT, Al-Betar MA (2013) Intelligent water drops algorithm for rough set feature selection. In: Selamat A et al (eds) ACIIDS 2013, Part II, LNAI 7803. Springer, Berlin, pp 356–365

    Google Scholar 

  • Aslahi-Shahri BM, Rahmani R, Chizari M, Maralani A, Eslami M, Golkar MJ, Ebrahim A (2015) A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl. doi:10.1007/s00521-015-1964-2

    Google Scholar 

  • Chen R-C, Cheng K-F, Hsieh C-F (2009) Using rough set and support vector machine for network intrusion detection. Int J Netw Secur Appl 1(1):1–13

    Google Scholar 

  • Cortes C, Vapnik V (1995) Support-Vector Networks. Mach Learn 20(3):273–297. doi:10.1023/A:1022627411411

  • Eid HF, Darwish A, Hassanien AE, Abraham A (2010) Principle components analysis and support vector machine based intrusion detection system. In: IEEE international conference on intelligent systems design and applications, 978-1-4244-8136-1/10

  • El-Khatib K (2010) Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Trans Parallel Distrib Syst 21(8):1143–1149

    Article  Google Scholar 

  • Guo C, Zhou Y, Ping Y, Zhang Z, Liu G, Yang Y (2013) A distance sum-based hybrid method for intrusion detection. Appl Intell 40:178–188

    Article  Google Scholar 

  • Huang C-L, Wang C-J (2006) A GA-based feature selection and parameters optimization for support vector machines. Expert Syst Appl 31:231–240. doi:10.1016/j.eswa.2005.09.024

    Article  Google Scholar 

  • Iglesias F, Zseby T (2015) Analysis of network traffic features for anomaly detection. Mach Learn 101:59–84. doi:10.1007/s10994-014-5473-9

    Article  MathSciNet  Google Scholar 

  • Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J 16:507–521

    Article  Google Scholar 

  • Kuang F, Zhang S, Jin Z, Xu W (2015) A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput 19:1187. doi:10.1007/s00500-014-1332-7

    Article  MATH  Google Scholar 

  • Pozi MSM, Sulaiman MN, Mustapha N, Perumal T (2015) Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming. Neural Process Lett. doi:10.1007/s11063-015-9457-y

    Google Scholar 

  • Shah-Hosseini H (2009) Optimization with the nature-inspired intelligent water drops algorithm. In: dos Santos WP (ed) Evolutionary computation. I-Tech, Vienna, p 572. ISBN 978-953-307-008-7

  • Singh S, Silakari S (2009) A survey of cyber attack detection systems. Int J Comput Sci Netw Secur 9(5):1–10

    Google Scholar 

  • Suthaharan S, Panchagnula T (2012) Feature selection with data cleaning for intrusion detection system. Relevance 978-1-4673-1375-9/12/$31.00 2012 IEEE

  • Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Acharya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Acharya, N., Singh, S. An IWD-based feature selection method for intrusion detection system. Soft Comput 22, 4407–4416 (2018). https://doi.org/10.1007/s00500-017-2635-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2635-2

Keywords

Navigation