Abstract
Intrusion detection systems play an important role in securing computer networks. The existing methods forĀ intrusion detection deal with huge amount of data which containsĀ irrelevant or redundantĀ features. Accordingly, feature selection is critical for improving classification accuracy in an intrusion detection system. In this paper, we proposed a novel algorithm combining a variety of feature selection methods based on majority voting rule, and used the SVM as the basic classification algorithm. Experiments on NSL-KDD dataset indicate that the proposed algorithm selects superior feature subset than the state-of-the-art feature selection approaches used in the field of intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST special publication, vol. 800, p. 94 (2007)
Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. 34, 2227ā2235 (2011)
James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning, vol. 103. Springer, Heidelberg (2013)
Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157ā1182 (2003)
Nguyen, H.T., PetroviÄ, S., Franke, K.: A comparison of feature-selection methods for intrusion detection. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 242ā255 (2010)
He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: NIPS, vol. 189 (2005)
Kira, K., Rendell, L.A.: The feature selection problem: traditional methods and a new algorithm. In: AAAI, pp. 129ā134 (1992)
Robnik-Å ikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53, 23ā69 (2003)
Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: The Seventh International Conference on Tools with Artificial Intelligence, pp. 388ā391 (1995)
Yang, Y., Shen, H.T., Ma, Z., Huang, Z., Zhou, X.: L2, 1-norm regularized discriminative feature selection for unsupervised learning. In: IJCAI Proceedings of International Joint Conference on Artificial Intelligence, p. 1589 (2011)
Hosseini Bamakan, S.M., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90ā102 (2016)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1ā6 (2009)
Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning. In: ICML, pp. 359ā366 (2000)
Lin, W.-C., Ke, S.-W., Tsai, C.-F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78, 13ā21 (2015)
Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37, 6225ā6232 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2018 Springer International Publishing AG
About this paper
Cite this paper
Hao, Y., Hou, Y., Li, L. (2018). A Novel Algorithm for Feature Selection Used in Intrusion Detection. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_98
Download citation
DOI: https://doi.org/10.1007/978-3-319-61542-4_98
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61541-7
Online ISBN: 978-3-319-61542-4
eBook Packages: EngineeringEngineering (R0)