Skip to main content

Detecting Network Intrusions Using Multi-class Logistic Regression and Correlation-Based Feature Selection

  • Conference paper
  • First Online:
Book cover Advanced Information Technology, Services and Systems (AIT2S 2017)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 25))

  • 853 Accesses

Abstract

Because they’re facilitating life, using computers and other intelligent devices associated with internet has become vital in those days. Banking transactions, education, trade marketing, texting … are all daily and important operations that relies on such technology. Information systems that handle those operations must be kept secure from any intrusive activity. To help ensure that, we must take into consideration several subjects such as access control by managing confidentiality, integrity and availability, as well as deploying detection and prevention tools and mechanisms that help preparing for and dealing with attacks. In this perspective, we propose a network intrusion detection model based on multiclass logistic regression (MLR) and Correlation-based feature selection (CFS). Results will be discussed with respect to NSL-KDD Dataset, and compared to other techniques based on various classification methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  2. John, G., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence, pp. 338–345 (1995)

    Google Scholar 

  3. Chang, C., Lin, C.: LIBSVM: a Library for Support Vector Machines (2001). http://www.csie.ntu.edu.tw/~cjlin/libsvm

  4. NSL-KDD (2009). http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html

  5. KDD CUP (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  6. McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)

    Article  Google Scholar 

  7. Rasmussen, C.E.: fmincg minimization function. http://learning.eng.cam.ac.uk/carl/code/minimize/

  8. Waikato environment for Knowledge analysis (Weka) and Using Weka in Matlab. http://www.mathworks.com/matlabcentral/fileexchange/50120-using-weka-in-matlab

  9. Hall, M.A., Smith, L.A.: Feature subset selection: a correlation based filter approach. University of Waikato (1997)

    Google Scholar 

  10. Denning, D.E., Edwards, D.L., Jagannathan, R., Lunt, T.F., Neumann, P.G.: A prototype IDES: a real-time intrusion detection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park

    Google Scholar 

  11. Roesch, M.: Snort — lightweight intrusion detection for networks. In: Proceedings of the 13th Systems Administration Conference, pp. 229–238. Usenix Association, Seattle (1999)

    Google Scholar 

  12. Jagannathan, R., Lunt, T.F., Anderson, D., Dodd, C., Gilham, F., Jalali, C., Javitz, H.S., Neumann, P.G., Tamaru, A., Valdes, A.: System design document: next-generation intrusion-detection expert system (NIDES). Technical report, Computer Science Laboratory, SRI International, Menlo Park (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taha Ait tchakoucht .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ait tchakoucht, T., Ezziyyani, M. (2018). Detecting Network Intrusions Using Multi-class Logistic Regression and Correlation-Based Feature Selection. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-69137-4_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69137-4_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69136-7

  • Online ISBN: 978-3-319-69137-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics