Abstract
In today's environment, an Intrusion Detection System (IDS) is becoming increasingly crucial in a network's Defense System to protect our network from any external threats or attack. The primary function of an IDS is to offer a shield for a specific host or network, as well as to examine and forecast client network access activities. The entire traffic is classified as normal or an assault based on these patterns. In order to classify traffic as valid or malicious, IDS must process all incoming communication over networks. As a result, IDS must cope with significant or enormous amounts of data. However, in IDS, not all features may be required to be processed among this data. As a result, extracting or locating the only relevant features among all features is always challenging. To address this issue, we have proposed a feature selection technique using Principal component analysis with Decision tree algorithm (DT-PCA) over real-time datasets, i.e., (CICIDS2017). The proposed classifier (Decision Tree) employing Principal component analysis performed well over CICIDS2017 datasets, according to the results presented in this research. To measure the performance or efficiency of the method, the most important metrics namely, recall, F-measure, precision, and accuracy have been used in this paper. In addition, this research examines the differences between DT-PCA and DT with all features. According to the CICIDS2017 datasets, the DT-PCA approaches can improve the IDS's performance and the accuracy rate can be achieved more than 99%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gupta, U., Gupta, D.: Least squares large margin distribution machine for regression. Appl. Intell. Springer, 1–36 (2021)
Tidjon, L.N., Frappier, M., Mammar, A.: Intrusion detection systems: A cross-domain overview. IEEE Commun. Surv. Tutorials. 21(4), 3639 (2019)
Liang, W., Li, K.C., Long, J., Kui, X., Zomaya, A.Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063 (2020)
Rani, M.S., Xavier, S.B.: A hybrid intrusion detection system based on c5.0 decision tree and one-class svm. Int. J. Curr. Eng. Technol. 5, 2001 (2015)
Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of ga and svm for intrusion detection system. Neural Comput. Appl. 27, 1669 (2016)
Gupta, U., Gupta, D.: Regularized based implicit Lagrangian twin extreme learning machine in primal for pattern classification. Int. J. Mach. Learn. Cyber. Springer, 1311–1334 (2021
Acharya, N., Singh, S.: An iwd-based feature selection method for intrusion detection system. Soft Comput. 22, 1–10 (2017)
Nanda, N.B., Parikh, A.: Network intrusion detection system based experimental study of combined classifiers using random forest classifiers for feature selection. Int. J. (IJRECE). 6(4), 341 (2018)
Elhag, S., Fernández, A., Altalhi, A., Alshomrani, S., Herrera, F.: A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems. Soft Comput. 23, 132 (2019)
Sah, G., Banerjee, S.: Feature reduction and classifications techniques for intrusion detection system. In: International Conference on Communication and Signal Processing. IEEE, 1547–1551 (2020)
Solani, S., Jadav, N.K.: A novel approach to reduce false-negative alarm rate in network-based intrusion detection system using linear discriminant analysis. Inventive Commun. Computat. Springer, 911–921 (2021)
Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: A comparative study. J. Ambient Intell. Humanized Comput. 12, 1249–1266 (2020)
Elmasry, W., Akbulut, A., Zaim, A.H.: Comparative evaluation of different classification techniques for masquerade attack detection. Int. J. Inf. Comput. Secur. 13(2), 187 (2020)
Sah, G., Goswami, R.S., Nandi, S.K.: Machine learning methods for predicting the popularity of forth coming objects. Int. J. Innovative Technol. Exploring Eng. (IJITEE). 9(2S), 645 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sah, G., Banerjee, S. (2022). An Intrusion Detection Approach Based on Decision Tree-Principal Component Analysis Over CICIDS2017. In: Gupta, D., Goswami, R.S., Banerjee, S., Tanveer, M., Pachori, R.B. (eds) Pattern Recognition and Data Analysis with Applications. Lecture Notes in Electrical Engineering, vol 888. Springer, Singapore. https://doi.org/10.1007/978-981-19-1520-8_45
Download citation
DOI: https://doi.org/10.1007/978-981-19-1520-8_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1519-2
Online ISBN: 978-981-19-1520-8
eBook Packages: Computer ScienceComputer Science (R0)