Abstract
Intrusion detection system (IDS) is constructed primarily to detect and block malicious attacks on a network. Several artificial intelligence techniques and genetic algorithms are utilized to construct IDS. In this paper, a model for intrusion detection system is developed using a correlation-based feature selection system integrated with bagging. This model focuses only on detection of malicious actions on a network. Correlation-based feature selection (CFS) is a feature selection technique which is based on test theory and developed beforehand by using real and artificial problems. Comparatively, it is faster and significantly improves the performance of the learning algorithm. Bagging is a machine learning algorithm which is a variation of decision tree algorithm. This paper presents the experimental results by utilizing the Kyoto intrusion detection dataset and the results show that CFS with bagging performs better in comparison with other supervised classifiers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kemmerer RA, Vigna G (2002) Intrusion detection: a brief history and overview. Computer 35(4):supl27–supl30. https://doi.org/10.1109/mc.2002.1012428
Laskov P, Düssel P, Schäfer C, Rieck K (2005) Learning intrusion detection: supervised or unsupervised? In: Roli F, Vitulano S (eds) Image analysis and processing—ICIAP 2005. ICIAP 2005. Lecture notes in computer science, vol 3617. Springer, Berlin, Heidelberg
Bahrololum M, Salahi E, Khaleghi M (2009) Machine learning techniques for feature reduction in intrusion detection systems: a comparison. In: 2009 Fourth international conference on computer sciences and convergence information technology, Seoul, pp 1091–1095
Hui L, Yonghui C (2010) Research intrusion detection techniques from the perspective of machine learning. In: 2010 Second international conference on multimedia and information technology, Kaifeng, pp 166–168
Divyatmika, Sreekesh M (2016 A two-tier network based intrusion detection system architecture using machine learning approach. In: 2016 International conference on electrical, electronics, and optimization techniques (ICEEOT), Chennai, pp 42–47
Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), Subotica, pp 000277–000282
Das S, Nene MJ (2017) A survey on types of machine learning techniques in intrusion prevention systems. In: 2017 International conference on wireless communications, signal processing and networking (WiSPNET), Chennai, pp 2296–2299
Zaman M, Lung C (2018) Evaluation of machine learning techniques for network intrusion detection. In: NOMS 2018—2018 IEEE/IFIP network operations and management symposium, Taipei, pp 1–5
Çavuşoğlu Ü (2019) Appl Intell. https://doi.org/10.1007/s10489-018-01408-x
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, Ottawa, ON, pp 1–6
Kumar A et al (2019a) An enhanced quantum key distribution protocol for security authentication. J Discr Math Sci Cryptogr 22(4):499–507
Kumar A et al (2019b) An improved quantum key distribution protocol for verification. J Discr Math Sci Cryptogr 22(4):491–498
Panwar D, Tomar P, Singh V (2018) Hybridization of Cuckoo-ACO algorithm for test case prioritization” J Stat Manage Syst 21(4): 539–546
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dyaram, A., Manojkumar, V., Sairabanu, J., Sumaiya Thaseen, I. (2021). Analysis of Ensemble Classifiers with Feature Selection for an Effective Intrusion Detection Model. In: Purohit, S., Singh Jat, D., Poonia, R., Kumar, S., Hiranwal, S. (eds) Proceedings of International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-5077-5_8
Download citation
DOI: https://doi.org/10.1007/978-981-15-5077-5_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5076-8
Online ISBN: 978-981-15-5077-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)