Skip to main content

An Intrusion Detection Approach Based on Decision Tree-Principal Component Analysis Over CICIDS2017

  • Conference paper
  • First Online:
Pattern Recognition and Data Analysis with Applications

Abstract

In today's environment, an Intrusion Detection System (IDS) is becoming increasingly crucial in a network's Defense System to protect our network from any external threats or attack. The primary function of an IDS is to offer a shield for a specific host or network, as well as to examine and forecast client network access activities. The entire traffic is classified as normal or an assault based on these patterns. In order to classify traffic as valid or malicious, IDS must process all incoming communication over networks. As a result, IDS must cope with significant or enormous amounts of data. However, in IDS, not all features may be required to be processed among this data. As a result, extracting or locating the only relevant features among all features is always challenging. To address this issue, we have proposed a feature selection technique using Principal component analysis with Decision tree algorithm (DT-PCA) over real-time datasets, i.e., (CICIDS2017). The proposed classifier (Decision Tree) employing Principal component analysis performed well over CICIDS2017 datasets, according to the results presented in this research. To measure the performance or efficiency of the method, the most important metrics namely, recall, F-measure, precision, and accuracy have been used in this paper. In addition, this research examines the differences between DT-PCA and DT with all features. According to the CICIDS2017 datasets, the DT-PCA approaches can improve the IDS's performance and the accuracy rate can be achieved more than 99%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gupta, U., Gupta, D.: Least squares large margin distribution machine for regression. Appl. Intell. Springer, 1–36 (2021)

    Google Scholar 

  2. Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: A cross-domain overview. IEEE Commun. Surv. Tutorials. 21(4), 3639 (2019)

    Article  Google Scholar 

  3. Liang, W., Li, K.C., Long, J., Kui, X., Zomaya, A.Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063 (2020)

    Article  Google Scholar 

  4. Rani, M.S., Xavier, S.B.: A hybrid intrusion detection system based on c5.0 decision tree and one-class svm. Int. J. Curr. Eng. Technol. 5, 2001 (2015)

    Google Scholar 

  5. Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of ga and svm for intrusion detection system. Neural Comput. Appl. 27, 1669 (2016)

    Article  Google Scholar 

  6. Gupta, U., Gupta, D.: Regularized based implicit Lagrangian twin extreme learning machine in primal for pattern classification. Int. J. Mach. Learn. Cyber. Springer, 1311–1334 (2021

    Google Scholar 

  7. Acharya, N., Singh, S.: An iwd-based feature selection method for intrusion detection system. Soft Comput. 22, 1–10 (2017)

    Google Scholar 

  8. Nanda, N.B., Parikh, A.: Network intrusion detection system based experimental study of combined classifiers using random forest classifiers for feature selection. Int. J. (IJRECE). 6(4), 341 (2018)

    Google Scholar 

  9. Elhag, S., Fernández, A., Altalhi, A., Alshomrani, S., Herrera, F.: A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems. Soft Comput. 23, 132 (2019)

    Article  Google Scholar 

  10. Sah, G., Banerjee, S.: Feature reduction and classifications techniques for intrusion detection system. In: International Conference on Communication and Signal Processing. IEEE, 1547–1551 (2020)

    Google Scholar 

  11. Solani, S., Jadav, N.K.: A novel approach to reduce false-negative alarm rate in network-based intrusion detection system using linear discriminant analysis. Inventive Commun. Computat. Springer, 911–921 (2021)

    Google Scholar 

  12. Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: A comparative study. J. Ambient Intell. Humanized Comput. 12, 1249–1266 (2020)

    Google Scholar 

  13. Elmasry, W., Akbulut, A., Zaim, A.H.: Comparative evaluation of different classification techniques for masquerade attack detection. Int. J. Inf. Comput. Secur. 13(2), 187 (2020)

    Google Scholar 

  14. Sah, G., Goswami, R.S., Nandi, S.K.: Machine learning methods for predicting the popularity of forth coming objects. Int. J. Innovative Technol. Exploring Eng. (IJITEE). 9(2S), 645 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gulab Sah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sah, G., Banerjee, S. (2022). An Intrusion Detection Approach Based on Decision Tree-Principal Component Analysis Over CICIDS2017. In: Gupta, D., Goswami, R.S., Banerjee, S., Tanveer, M., Pachori, R.B. (eds) Pattern Recognition and Data Analysis with Applications. Lecture Notes in Electrical Engineering, vol 888. Springer, Singapore. https://doi.org/10.1007/978-981-19-1520-8_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1520-8_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1519-2

  • Online ISBN: 978-981-19-1520-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics