Abstract
This paper proposes a feature selection approach, based on improved Discrete Particle Swarm Optimization (DPSO), to solve the “dimension disaster” problem in data classification; it is named Progressive Binary Particle Swarm Optimization (PBPSO). This feature selection approach is highly problem-dependent and influenced by the locations of particles. It adopts the principle of “partial retention - change - reduction of duplication - update” in the process of selection, and defines a new fitness function describing the correlation between the features and class labels. Experimentation was conducted using of the KDDCup99 data set to evaluate our proposed PBPSO. The experimental results show that 14 features were selected from the original data space with 41 features. Three classic classifiers, namely J48, Naive Bayes and ID3, were then used to further evaluate the performance of the selected features. The classification accuracy rates on the different classifiers achieved using the selected feature subset are similar to those achieved using the original feature set. The training time is, however, significantly reduced. In comparison with other similar algorithms, including Genetic Algorithm GA and Greedy Algorithm FGA. The results show that the PBPSO extracts fewer features, achieves slightly higher classification accuracy, and less time consuming in terms of model training. It has been demonstrated that the PBPSO enhances the practicability of certain classification algorithms in handling high-dimensional data.
Supported by Shanxi Provincial Department of Science and Technology, Natural Science Fund Project, 2016; Shanxi Scholarship Council, Scholarship Fund Project, 2016; State Administration of Foreign Experts, Overseas Training Fund Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Daoyuan, H., Jinghua, S.: Network security (2004)
Anderson, J.P.: Computer security threat monitoring and surveillance (1980)
Spafford, E.H.: Crisis and aftermath. Commun. ACM 32(6), 678–687 (1989)
Caruana, R., Freitag, D.: Greedy attribute selection. In: ICML, pp. 28–36. Citeseer (1994)
Cox, I.J., Miller, M.L., Bloom, J.A., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Heidelberg (2002)
Tataru, R. L., El Assad, S., D’eforges, O.: Improved blind DCT watermarking by using chaotic sequences. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 46–50. IEEE (2012)
Dash, M., Liu, H.: Feature selection for classification. Intell. Data Anal. 1(1), 131–156 (1997)
Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1), 273–324 (1997)
John, G.H., Kohavi, R., Pfleger, K., et al.: Irrelevant features and the subset selection problem. In: Machine Learning: Proceedings of the Eleventh International Conference, pp. 121–129 (1994)
Chen, B., Hong, J., Wang, Y.: The problem of finding optimal subset of features. Chin. J. Comput.-Chin. Edn. 20, 133–138 (1997)
Eberhart, R.C., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, New York, NY, vol. 1, pp. 39–43 (1995)
Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.-A.: A detailed analysis of the KDD cup 99 data set. In: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications (2009)
Gong, S., Gong, X., Bi, X.: Feature selection method for network intrusion based on gqpso attribute reduction. In: 2011 International Conference on Multimedia Technology (ICMT), pp. 6365–6368. IEEE (2011)
Zhang, X.Q., Gu, C.H.: A method to extract network intrusion detection feature. J. South China Univ. Technol. (Nat. Sci. Edn.) 1, 019 (2010)
Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on TCM-KNN algorithm. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 13–19. ACM (2007)
Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M., et al.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)
Wang, X., Sun, L.: Ant algorithm inspired immune intrusion detector generation algorithm. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 124–127. IEEE (2011)
Shitao, C., Guolong, C., Wenzhong, G., Yanhua, L.: Feature selection of the intrusion detection data based on particle swarm optimization and neighborhood reduction. J. Comput. Res. Dev. 7, 018 (2010)
Su, J.-R., Li, B.-Y., Wang, X.-K.: Particle swarm optimization using average information of swarm. Jisuanji Gongcheng yu Yingyong (Comput. Eng. Appl.) 43(10), 58–59 (2007)
Group, W.M., et al.: The waikato environment for knowledge analysis. http://www.cs.waikato.ac.nz/ml/weka-2007
Xu, J., You, J., Liu, F.: A fuzzy rules based approach for performance anomaly detection. In: Proceedings of the 2005 IEEE Networking, Sensing and Control, pp. 44–48. IEEE (2005)
Amudha, P., Karthik, S., Sivakumari, S.: A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci. World J. (2015)
Singh, A., Banafar, H., Pippal, R.S.: Intrusion detection on KDD99cup dataset using K-means, PSO and GA: a review. Probe 300, 300 (2015)
Lin, S.-W., Ying, K.-C., Lee, C.-Y., Lee, Z.-J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 3285–3290 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, J., Jin, Y. (2019). A Novel Feature-Selection Approach Based on Particle Swarm Optimization Algorithm for Intrusion Detection Systems (Workshop Paper). In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-30146-0_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30145-3
Online ISBN: 978-3-030-30146-0
eBook Packages: Computer ScienceComputer Science (R0)