Skip to main content

A Novel Algorithm for Feature Selection Used in Intrusion Detection

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 612))

  • 1783 Accesses

Abstract

Intrusion detection systems play an important role in securing computer networks. The existing methods forĀ intrusion detection deal with huge amount of data which containsĀ irrelevant or redundantĀ features. Accordingly, feature selection is critical for improving classification accuracy in an intrusion detection system. In this paper, we proposed a novel algorithm combining a variety of feature selection methods based on majority voting rule, and used the SVM as the basic classification algorithm. Experiments on NSL-KDD dataset indicate that the proposed algorithm selects superior feature subset than the state-of-the-art feature selection approaches used in the field of intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.unb.ca/cic/research/datasets/nsl.html.

References

  1. Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST special publication, vol. 800, p. 94 (2007)

    Google ScholarĀ 

  2. Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. 34, 2227ā€“2235 (2011)

    ArticleĀ  Google ScholarĀ 

  3. James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning, vol. 103. Springer, Heidelberg (2013)

    Google ScholarĀ 

  4. Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157ā€“1182 (2003)

    MATHĀ  Google ScholarĀ 

  5. Nguyen, H.T., Petrović, S., Franke, K.: A comparison of feature-selection methods for intrusion detection. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 242ā€“255 (2010)

    Google ScholarĀ 

  6. He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: NIPS, vol. 189 (2005)

    Google ScholarĀ 

  7. Kira, K., Rendell, L.A.: The feature selection problem: traditional methods and a new algorithm. In: AAAI, pp. 129ā€“134 (1992)

    Google ScholarĀ 

  8. Robnik-Å ikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53, 23ā€“69 (2003)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  9. Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: The Seventh International Conference on Tools with Artificial Intelligence, pp. 388ā€“391 (1995)

    Google ScholarĀ 

  10. Yang, Y., Shen, H.T., Ma, Z., Huang, Z., Zhou, X.: L2, 1-norm regularized discriminative feature selection for unsupervised learning. In: IJCAI Proceedings of International Joint Conference on Artificial Intelligence, p. 1589 (2011)

    Google ScholarĀ 

  11. Hosseini Bamakan, S.M., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90ā€“102 (2016)

    ArticleĀ  Google ScholarĀ 

  12. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1ā€“6 (2009)

    Google ScholarĀ 

  13. Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning. In: ICML, pp. 359ā€“366 (2000)

    Google ScholarĀ 

  14. Lin, W.-C., Ke, S.-W., Tsai, C.-F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78, 13ā€“21 (2015)

    ArticleĀ  Google ScholarĀ 

  15. Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37, 6225ā€“6232 (2010)

    ArticleĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongle Hao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2018 Springer International Publishing AG

About this paper

Cite this paper

Hao, Y., Hou, Y., Li, L. (2018). A Novel Algorithm for Feature Selection Used in Intrusion Detection. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_98

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61542-4_98

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61541-7

  • Online ISBN: 978-3-319-61542-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics