Skip to main content

A Novel Feature-Selection Approach Based on Particle Swarm Optimization Algorithm for Intrusion Detection Systems (Workshop Paper)

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2019)

Abstract

This paper proposes a feature selection approach, based on improved Discrete Particle Swarm Optimization (DPSO), to solve the “dimension disaster” problem in data classification; it is named Progressive Binary Particle Swarm Optimization (PBPSO). This feature selection approach is highly problem-dependent and influenced by the locations of particles. It adopts the principle of “partial retention - change - reduction of duplication - update” in the process of selection, and defines a new fitness function describing the correlation between the features and class labels. Experimentation was conducted using of the KDDCup99 data set to evaluate our proposed PBPSO. The experimental results show that 14 features were selected from the original data space with 41 features. Three classic classifiers, namely J48, Naive Bayes and ID3, were then used to further evaluate the performance of the selected features. The classification accuracy rates on the different classifiers achieved using the selected feature subset are similar to those achieved using the original feature set. The training time is, however, significantly reduced. In comparison with other similar algorithms, including Genetic Algorithm GA and Greedy Algorithm FGA. The results show that the PBPSO extracts fewer features, achieves slightly higher classification accuracy, and less time consuming in terms of model training. It has been demonstrated that the PBPSO enhances the practicability of certain classification algorithms in handling high-dimensional data.

Supported by Shanxi Provincial Department of Science and Technology, Natural Science Fund Project, 2016; Shanxi Scholarship Council, Scholarship Fund Project, 2016; State Administration of Foreign Experts, Overseas Training Fund Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Daoyuan, H., Jinghua, S.: Network security (2004)

    Google Scholar 

  2. Anderson, J.P.: Computer security threat monitoring and surveillance (1980)

    Google Scholar 

  3. Spafford, E.H.: Crisis and aftermath. Commun. ACM 32(6), 678–687 (1989)

    Article  Google Scholar 

  4. Caruana, R., Freitag, D.: Greedy attribute selection. In: ICML, pp. 28–36. Citeseer (1994)

    Google Scholar 

  5. Cox, I.J., Miller, M.L., Bloom, J.A., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Heidelberg (2002)

    Google Scholar 

  6. Tataru, R. L., El Assad, S., D’eforges, O.: Improved blind DCT watermarking by using chaotic sequences. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 46–50. IEEE (2012)

    Google Scholar 

  7. Dash, M., Liu, H.: Feature selection for classification. Intell. Data Anal. 1(1), 131–156 (1997)

    Article  Google Scholar 

  8. Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1), 273–324 (1997)

    Article  Google Scholar 

  9. John, G.H., Kohavi, R., Pfleger, K., et al.: Irrelevant features and the subset selection problem. In: Machine Learning: Proceedings of the Eleventh International Conference, pp. 121–129 (1994)

    Chapter  Google Scholar 

  10. Chen, B., Hong, J., Wang, Y.: The problem of finding optimal subset of features. Chin. J. Comput.-Chin. Edn. 20, 133–138 (1997)

    Google Scholar 

  11. Eberhart, R.C., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, New York, NY, vol. 1, pp. 39–43 (1995)

    Google Scholar 

  12. Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997)

    Google Scholar 

  13. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.-A.: A detailed analysis of the KDD cup 99 data set. In: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications (2009)

    Google Scholar 

  14. Gong, S., Gong, X., Bi, X.: Feature selection method for network intrusion based on gqpso attribute reduction. In: 2011 International Conference on Multimedia Technology (ICMT), pp. 6365–6368. IEEE (2011)

    Google Scholar 

  15. Zhang, X.Q., Gu, C.H.: A method to extract network intrusion detection feature. J. South China Univ. Technol. (Nat. Sci. Edn.) 1, 019 (2010)

    Google Scholar 

  16. Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on TCM-KNN algorithm. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 13–19. ACM (2007)

    Google Scholar 

  17. Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M., et al.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)

    Article  Google Scholar 

  18. Wang, X., Sun, L.: Ant algorithm inspired immune intrusion detector generation algorithm. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 124–127. IEEE (2011)

    Google Scholar 

  19. Shitao, C., Guolong, C., Wenzhong, G., Yanhua, L.: Feature selection of the intrusion detection data based on particle swarm optimization and neighborhood reduction. J. Comput. Res. Dev. 7, 018 (2010)

    Google Scholar 

  20. Su, J.-R., Li, B.-Y., Wang, X.-K.: Particle swarm optimization using average information of swarm. Jisuanji Gongcheng yu Yingyong (Comput. Eng. Appl.) 43(10), 58–59 (2007)

    Google Scholar 

  21. Group, W.M., et al.: The waikato environment for knowledge analysis. http://www.cs.waikato.ac.nz/ml/weka-2007

  22. Xu, J., You, J., Liu, F.: A fuzzy rules based approach for performance anomaly detection. In: Proceedings of the 2005 IEEE Networking, Sensing and Control, pp. 44–48. IEEE (2005)

    Google Scholar 

  23. Amudha, P., Karthik, S., Sivakumari, S.: A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci. World J. (2015)

    Google Scholar 

  24. Singh, A., Banafar, H., Pippal, R.S.: Intrusion detection on KDD99cup dataset using K-means, PSO and GA: a review. Probe 300, 300 (2015)

    Google Scholar 

  25. Lin, S.-W., Ying, K.-C., Lee, C.-Y., Lee, Z.-J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 3285–3290 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianzhen Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Jin, Y. (2019). A Novel Feature-Selection Approach Based on Particle Swarm Optimization Algorithm for Intrusion Detection Systems (Workshop Paper). In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30146-0_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30145-3

  • Online ISBN: 978-3-030-30146-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics