Skip to main content

Employing Feature Selection to Improve the Performance of Intrusion Detection Systems

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13291))

Included in the following conference series:

Abstract

Intrusion detection systems use datasets with various features to detect attacks and protect computers and network systems from these attacks. However, some of these features are irrelevant and may reduce the intrusion detection system’s speed and accuracy. In this study, we use feature selection methods to eliminate non-relevant features. We compare the performance of fourteen feature-selection methods, on three ML techniques using the UNSW-NB15, Kyoto 2006+ and DoHBrw-2020 datasets. The most relevant features of each dataset are identified, which show that feature selection methods can increase the accuracy of anomaly detection and classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://cloudstor.aarnet.edu.au/plus/index.php/s/2DhnLGDdEECo4ys.

  2. 2.

    https://www.takakura.com/Kyoto_data/.

  3. 3.

    https://www.unb.ca/cic/datasets/dohbrw-2020.html.

  4. 4.

    https://github.com/theavila/EmployingFS.

References

  1. Salem, A., Tang, J., Liu, H.: Feature selection for clustering: a review. In: Data Clustering: Algorithms and Applications, pp. 29–60. CRC Press (2013)

    Google Scholar 

  2. Aha, D., Kibler, D., Albert, M.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)

    Google Scholar 

  3. Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  4. Alazab, A., Hobbs, M., Abawajy, J., Alazab, M.: Using feature selection for intrusion detection system. In: ISCIT, pp. 296–301. IEEE (2012)

    Google Scholar 

  5. Avila, R., Khoury, R., Khoury, R., Petrillo, F.: Use of security logs for data leak detection: a systematic literature review. Secur. Commun. Netw. 2021(1), 29 (2021)

    Google Scholar 

  6. Binbusayyis, A., Vaiyapuri, T.: Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7, 106495–106513 (2019)

    Article  Google Scholar 

  7. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 1153–1176 (2016)

    Article  Google Scholar 

  8. Jie, G.: An effective intrusion detection model based on pls-logistic regression with feature augmentation. Cyber Secur. 1(1), 133–140 (2020)

    Google Scholar 

  9. Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37–50 (2018)

    Article  Google Scholar 

  10. Harish, B.S., Revanasiddappa, M.B.: A comprehensive survey on various feature selection methods to categorize text documents. Int. J. Comput. Appl. 164, 1–7 (2017)

    Google Scholar 

  11. Idhammad, M., Afdel, K., Belouch, M.: Semi-supervised machine learning approach for DDoS detection. Appl. Intell. 48(10), 3193–3208 (2018)

    Article  Google Scholar 

  12. Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1–3), 59–84 (2015)

    Article  MathSciNet  Google Scholar 

  13. Janarthanan, T., Zargari, S.: Feature selection in UNSW-NB15 and KDDCUP’99 datasets. In: ISIE, pp. 1881–1886. IEEE (2017)

    Google Scholar 

  14. Koushal, K., Jaspreet, S.: Network intrusion detection with feature selection techniques using machine-learning algorithms. Int. J. Comput. Appl. 150(12), 1–13 (2016)

    Google Scholar 

  15. Li, J., et al.: Feature selection: a data perspective. ACM Comput. Surv. 50(6), 45 (2017)

    Google Scholar 

  16. Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 8 (2013)

    Article  Google Scholar 

  17. Pham, N.T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: ACSW, pp. 2:1–2:6. ACM (2018)

    Google Scholar 

  18. Poggio, T., Mhaskar, H., Rosasco, L., Miranda, B., Liao, Q.: Why and when can deep-but not shallow-networks avoid the curse of dimensionality: a review. Int. J. Autom. Comput. 14(5), 16 (2017)

    Article  Google Scholar 

  19. Prasad, M., Tripathi, S., Dahal, K.P.: An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 12 (2020)

    Article  Google Scholar 

  20. Sharma, M., Kaur, P.: A comprehensive analysis of nature-inspired meta-heuristic techniques for feature selection problem. Arch. Comput. Methods Eng. 1(25), 1103–1127 (2021)

    Article  MathSciNet  Google Scholar 

  21. Sheikhpour, R., Sarram, M.A., Gharaghani, S., Chahooki, M.Z.: A survey on semi-supervised feature selection methods. Pattern Recognit. 64, 141–158 (2017)

    Article  Google Scholar 

  22. Sy, B.K.: Signature-based approach for intrusion detection. In: Perner, P., Imiya, A. (eds.) MLDM 2005. LNCS (LNAI), vol. 3587, pp. 526–536. Springer, Heidelberg (2005). https://doi.org/10.1007/11510888_52

    Chapter  Google Scholar 

  23. Tian, S., Yu, J., Yin, C.: Anomaly detection using support vector machines. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 592–597. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28647-9_97

    Chapter  Google Scholar 

  24. Venkatesh, B., Anuradha, J.: A review of feature selection and its methods. Cybern. Inf. Technol. 19, 26 (2017)

    MathSciNet  Google Scholar 

  25. Wang, Y.: A multinomial logistic regression modeling approach for anomaly intrusion detection. Comput. Secur. 24(8), 662–674 (2005)

    Article  Google Scholar 

  26. Xue, B., Zhang, M., Browne, W.N., Yao, X.: A survey on evolutionary computation approaches to feature selection. IEEE Trans. Evol. Comput. 20(4), 606–626 (2016)

    Article  Google Scholar 

  27. Yang, Y., McLaughlin, K., Sezer, S., Yuan, Y.B., Huang, W.: Stateful intrusion detection for IEC 60870-5-104 SCADA security. In: 2014 IEEE PES General Meeting, vol. 1, p. 5 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ricardo Avila , Raphaël Khoury , Christophe Pere or Kobra Khanmohammadi .

Editor information

Editors and Affiliations

Appendix A - Complementary Tables

Appendix A - Complementary Tables

Table 8. Selected and removed features from the UNSW-NB15 dataset according to each of the fourteen feature-selection methods.
Table 9. Selected and removed features from the Kyoto 2006+ dataset according to each of the fourteen feature-selection methods.
Table 10. Selected and removed features from the DoHBrw-2020 dataset according to each of the fourteen feature-selection methods.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Avila, R., Khoury, R., Pere, C., Khanmohammadi, K. (2022). Employing Feature Selection to Improve the Performance of Intrusion Detection Systems. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https://doi.org/10.1007/978-3-031-08147-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08147-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08146-0

  • Online ISBN: 978-3-031-08147-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics