Skip to main content

An Automatic Correlated Recursive Wrapper-Based Feature Selector (ACRWFS) for Efficient Classification of Network Intrusion Features

  • Conference paper
  • First Online:
Intelligent Sustainable Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 213))

  • 723 Accesses

Abstract

Evolving technological paradigms direct information society’s developments like Internet of Things (IoT), pervasive technologies. These technologies are built on networks that integrate with others for meeting end user needs. These networks are also susceptible to attacks. Technological knowledge is also used by cyber attackers for developing attacks and their numbers have increased exponentially. Hence, to safeguard networks from attackers, cybersecurity experts have become a fundamental pillar in cybersecurity and especially in Intrusion Detection Systems (IDS) which have grown into becoming the fundamental tool for cybersecurity in its provision of services on the internet. Though IDSs monitor networks for doubtful activities and send alerts on encountering such items, they are confided in real-time analytics. A new model of automated feature selections for network IDS parameters that are pre-prpocessed for efficieny of classifications is presented. This paper’s proposed methodology combines multiple techniques for improving automated feature selections. The proposed technique is experimented on the KDD Cup 1999 dataset, a common source for examining IDS systems. The technique is also evaluated for efficiency in feature selection by three classifiers in terms of their test and train scores.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Key Challenges. https://www.weforum.org/centre-for-cybersecurity/home/. Accessed 15 April 2019

  2. Al-Jarrah, O.Y., Alhussein, O., Yoo, P.D., Muhaidat, S., Taha, K., Kim, K.: Data randomization and cluster-based partitioning for botnet intrusion detection. IEEE Trans. Cybern. 46, 1796–1806 (2015). https://doi.org/10.1109/TCYB.2015.2490802

    Article  Google Scholar 

  3. Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 8, 2474–2482 (2017). https://doi.org/10.1109/TSG.2017.2670144

    Article  Google Scholar 

  4. Joldzic, O., Djuric, Z., Vuletic, P.: A transparent and scalable anomaly-based dos detection method. Comput. Netw. 104, 27–42 (2016). https://doi.org/10.1016/j.comnet.2016.05.004

    Article  Google Scholar 

  5. Papamartzivanos, D., Mármol, F.G., Kambourakis, G.: Den-dron: Genetic trees driven rule induction for network intrusion de-tection systems. Fut. Gen. Comput. Syst. 79, 558–574 (2018). https://doi.org/10.1016/j.future.2017.09.056

    Article  Google Scholar 

  6. Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), IEEE. pp. 1–5 (2016). https://doi.org/10.1109/platcon.2016.7456805

  7. Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21, 686–728 (2019)

    Article  Google Scholar 

  8. Types of Intrusion Detection System. https://en.wikipedia.org/wiki/Intrusion_detection_system

    Google Scholar 

  9. Jianliang, M., Haikun, S., Ling, B.: The application on intrusion detection based on K-means cluster algorithm. In: International Forum on Information Technology and Application, IEEE, 15–17 May 2009, pp. 150–152

    Google Scholar 

  10. Geluvaraj, B., Satwik, P.M., Kumar, T.A.: The future of cybersecurity: major role of artificial intelligence, machine learning, and deep learning in cyberspace. In Proceedings of the International Conference on Computer Networks and Communication Technologies. Springer: Singapore (2019), pp. 739–747

    Google Scholar 

  11. Peng, K.A.I., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch kmeans for intrusion detection system over big data. In: Special Section on Cyber-Physical- Social Computing and Networking. 10.1109/ACCESS.2018.2810267

    Google Scholar 

  12. Harrington, D., Presuhn, R., Wijnen, B.: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. http://www.ietf.org/rfc/rfc3411.txt. Accessed 16 April 2015

  13. Claise, B.: Cisco Systems NetFlow Services Export Version 9. http://tools.ietf.org/html/rfc3954. Accessed 16 April 2015

  14. Barford, P., Kline, J., Plonka, D., Ron, A.: A Signal Analysis of Network Traffic Anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW’02), Marseille, France, 6–8 November 2002; pp. 71–82

    Google Scholar 

  15. Kim, M.S., Kong, H.J., Hong, S.C., Chung, Hong, J.: A flow-based method for abnormal network traffic detection. Presented at IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea, 19–23 April 2004, pp. 599–612

    Google Scholar 

  16. Casas, P., Fillatre, L., Vaton, S., Nikiforov, I.: Volume anomaly detection in data networks: an optimal detection algorithm vs. the PCA approach. In: Valadas, R., Salvador, P. (eds.) Traffic Management and Traffic Engineering for the Future Internet, vol. 5464, Lecture Notes in Computer Science. Springer, Berlin/Heidelberg, Germany (2009), pp. 96–113

    Google Scholar 

  17. Jingle, I., Rajsingh, E.: ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Human-centric Comput. Inf. Sci. 4 (2014). https://doi.org/10.1186/s13673-014-0008-8

  18. Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W.: Detection and defense of application-layer DDoS attacks in backbone web traffic. Fut. Gen. Comput. Syst. 38, 36–46 (2014)

    Article  Google Scholar 

  19. NfSen—Netflow Sensor. http://nfsen.sourceforge.net. Accessed 16 April 2015

  20. AKMA Labs FlowMatrix. http://www.akmalabs.com. Accessed 16 April 2015

  21. NtopNg—High-Speed Web-based Traffic Analysis and Flow Collection. http://www.ntop.org. Accessed 16 April 2015

  22. Larriva-Novo, X.A., Vega-Barbas, M., Villagra, V.A., Sanz Rodrigo, M.: Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access Appl. Sci. 8(10), 3430 (2020)

    Google Scholar 

  23. Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Comput. Sci. 127, 1–6 (2018)

    Article  Google Scholar 

  24. Ahmad, M., Basheri, M.J., Iqbal, Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. 10.1109/ACCESS.2018.2841987

    Google Scholar 

  25. Gaikwad, D., Thool, R.C.: Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International Conference on Computing Communication Control and Automation, IEEE. pp. 291–295 (2015). https://doi.org/10.1109/iccubea.2015.61

  26. Jabbar, M., Aluvalu, R., Reddy, S.S.S.:. Cluster based ensemble classification for intrusion detection system, in: Proceedings of the 9th International Conference on Machine Learning and Computing, pp. 253–257 (2017). https://doi.org/10.1145/3055635.3056595

  27. Paulauskas, N., Auskalnis, J.:. Analysis of data pre-processing influence on intrusion detection using nsl-kdd dataset, in: 2017 Open Conference of Electrical, Electronic and Information Sciences (eS-tream), IEEE. pp. 1–5 (2017). https://doi.org/10.1109/estream.2017.7950325

  28. Moustafa, N., Turnbull, B., Choo, K.K.R.: An ensemble intru-sion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. (2018). https://doi.org/10.1109/JIOT.2018.2871719

    Article  Google Scholar 

  29. Malik, A.J., Shahzad, W., Khan, F.A.: Network intrusion detec-tion using hybrid binary pso and random forests algorithm. Secur. Commun. Netw. 8, 2646–2660 (2015). https://doi.org/10.1002/sec.508

    Article  Google Scholar 

  30. Larriva-Novo, X.A., Vega-Barbas, M., Villagra, V.A., Sanz Rodrigo, M.: Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 8, 9005–9014 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Ramachandran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramachandran, P., Balasubramian, R. (2022). An Automatic Correlated Recursive Wrapper-Based Feature Selector (ACRWFS) for Efficient Classification of Network Intrusion Features. In: Raj, J.S., Palanisamy, R., Perikos, I., Shi, Y. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol 213. Springer, Singapore. https://doi.org/10.1007/978-981-16-2422-3_51

Download citation

Publish with us

Policies and ethics