Abstract
Evolving technological paradigms direct information society’s developments like Internet of Things (IoT), pervasive technologies. These technologies are built on networks that integrate with others for meeting end user needs. These networks are also susceptible to attacks. Technological knowledge is also used by cyber attackers for developing attacks and their numbers have increased exponentially. Hence, to safeguard networks from attackers, cybersecurity experts have become a fundamental pillar in cybersecurity and especially in Intrusion Detection Systems (IDS) which have grown into becoming the fundamental tool for cybersecurity in its provision of services on the internet. Though IDSs monitor networks for doubtful activities and send alerts on encountering such items, they are confided in real-time analytics. A new model of automated feature selections for network IDS parameters that are pre-prpocessed for efficieny of classifications is presented. This paper’s proposed methodology combines multiple techniques for improving automated feature selections. The proposed technique is experimented on the KDD Cup 1999 dataset, a common source for examining IDS systems. The technique is also evaluated for efficiency in feature selection by three classifiers in terms of their test and train scores.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Key Challenges. https://www.weforum.org/centre-for-cybersecurity/home/. Accessed 15 April 2019
Al-Jarrah, O.Y., Alhussein, O., Yoo, P.D., Muhaidat, S., Taha, K., Kim, K.: Data randomization and cluster-based partitioning for botnet intrusion detection. IEEE Trans. Cybern. 46, 1796–1806 (2015). https://doi.org/10.1109/TCYB.2015.2490802
Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 8, 2474–2482 (2017). https://doi.org/10.1109/TSG.2017.2670144
Joldzic, O., Djuric, Z., Vuletic, P.: A transparent and scalable anomaly-based dos detection method. Comput. Netw. 104, 27–42 (2016). https://doi.org/10.1016/j.comnet.2016.05.004
Papamartzivanos, D., Mármol, F.G., Kambourakis, G.: Den-dron: Genetic trees driven rule induction for network intrusion de-tection systems. Fut. Gen. Comput. Syst. 79, 558–574 (2018). https://doi.org/10.1016/j.future.2017.09.056
Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), IEEE. pp. 1–5 (2016). https://doi.org/10.1109/platcon.2016.7456805
Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21, 686–728 (2019)
Types of Intrusion Detection System. https://en.wikipedia.org/wiki/Intrusion_detection_system
Jianliang, M., Haikun, S., Ling, B.: The application on intrusion detection based on K-means cluster algorithm. In: International Forum on Information Technology and Application, IEEE, 15–17 May 2009, pp. 150–152
Geluvaraj, B., Satwik, P.M., Kumar, T.A.: The future of cybersecurity: major role of artificial intelligence, machine learning, and deep learning in cyberspace. In Proceedings of the International Conference on Computer Networks and Communication Technologies. Springer: Singapore (2019), pp. 739–747
Peng, K.A.I., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch kmeans for intrusion detection system over big data. In: Special Section on Cyber-Physical- Social Computing and Networking. 10.1109/ACCESS.2018.2810267
Harrington, D., Presuhn, R., Wijnen, B.: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. http://www.ietf.org/rfc/rfc3411.txt. Accessed 16 April 2015
Claise, B.: Cisco Systems NetFlow Services Export Version 9. http://tools.ietf.org/html/rfc3954. Accessed 16 April 2015
Barford, P., Kline, J., Plonka, D., Ron, A.: A Signal Analysis of Network Traffic Anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW’02), Marseille, France, 6–8 November 2002; pp. 71–82
Kim, M.S., Kong, H.J., Hong, S.C., Chung, Hong, J.: A flow-based method for abnormal network traffic detection. Presented at IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea, 19–23 April 2004, pp. 599–612
Casas, P., Fillatre, L., Vaton, S., Nikiforov, I.: Volume anomaly detection in data networks: an optimal detection algorithm vs. the PCA approach. In: Valadas, R., Salvador, P. (eds.) Traffic Management and Traffic Engineering for the Future Internet, vol. 5464, Lecture Notes in Computer Science. Springer, Berlin/Heidelberg, Germany (2009), pp. 96–113
Jingle, I., Rajsingh, E.: ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Human-centric Comput. Inf. Sci. 4 (2014). https://doi.org/10.1186/s13673-014-0008-8
Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W.: Detection and defense of application-layer DDoS attacks in backbone web traffic. Fut. Gen. Comput. Syst. 38, 36–46 (2014)
NfSen—Netflow Sensor. http://nfsen.sourceforge.net. Accessed 16 April 2015
AKMA Labs FlowMatrix. http://www.akmalabs.com. Accessed 16 April 2015
NtopNg—High-Speed Web-based Traffic Analysis and Flow Collection. http://www.ntop.org. Accessed 16 April 2015
Larriva-Novo, X.A., Vega-Barbas, M., Villagra, V.A., Sanz Rodrigo, M.: Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access Appl. Sci. 8(10), 3430 (2020)
Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Comput. Sci. 127, 1–6 (2018)
Ahmad, M., Basheri, M.J., Iqbal, Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. 10.1109/ACCESS.2018.2841987
Gaikwad, D., Thool, R.C.: Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International Conference on Computing Communication Control and Automation, IEEE. pp. 291–295 (2015). https://doi.org/10.1109/iccubea.2015.61
Jabbar, M., Aluvalu, R., Reddy, S.S.S.:. Cluster based ensemble classification for intrusion detection system, in: Proceedings of the 9th International Conference on Machine Learning and Computing, pp. 253–257 (2017). https://doi.org/10.1145/3055635.3056595
Paulauskas, N., Auskalnis, J.:. Analysis of data pre-processing influence on intrusion detection using nsl-kdd dataset, in: 2017 Open Conference of Electrical, Electronic and Information Sciences (eS-tream), IEEE. pp. 1–5 (2017). https://doi.org/10.1109/estream.2017.7950325
Moustafa, N., Turnbull, B., Choo, K.K.R.: An ensemble intru-sion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. (2018). https://doi.org/10.1109/JIOT.2018.2871719
Malik, A.J., Shahzad, W., Khan, F.A.: Network intrusion detec-tion using hybrid binary pso and random forests algorithm. Secur. Commun. Netw. 8, 2646–2660 (2015). https://doi.org/10.1002/sec.508
Larriva-Novo, X.A., Vega-Barbas, M., Villagra, V.A., Sanz Rodrigo, M.: Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 8, 9005–9014 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ramachandran, P., Balasubramian, R. (2022). An Automatic Correlated Recursive Wrapper-Based Feature Selector (ACRWFS) for Efficient Classification of Network Intrusion Features. In: Raj, J.S., Palanisamy, R., Perikos, I., Shi, Y. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol 213. Springer, Singapore. https://doi.org/10.1007/978-981-16-2422-3_51
Download citation
DOI: https://doi.org/10.1007/978-981-16-2422-3_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2421-6
Online ISBN: 978-981-16-2422-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)