Skip to main content

Improved Feature Selection Method using SBS-IG-Plus

  • Chapter
ISSE 2011 Securing Electronic Business Processes

Abstract

Any network can be represented by a set of attributes (features). There are several methods attempting to derive the best feature set at all. In our proposed method we exploited the anomaly detection rate and the false positive rate by using a Sequential Backward Search (SBS) method followed by Information Gain (IG) to get the best and valuable feature set properly. In SBS we used several classifiers to evaluate our results. These are Neural Network, Naïve Bayes, Decision Tree and Random Tree. Our method outperformed other approaches because of involving SBS method. We could reduce the huge data set to a more efficient and usable data set without any irrelevant features that defer the performance. Using these features we have enhanced the detection rate and reduced the alarm rate in the network. We have chosen the improved dataset from DARPA 98 Lincoln Lab evaluation Data set (NSL-KDD Set), because it is universally used for learning and testing in the IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Mukras, Rahman, Wiratunga, Nirmalie, Lothian, Robert, Chakraborti, Sutanu, Harper, David: Information Gain Feature Selection for Ordinal Text Classification using Probability Re-distribution. In Proc. of IJCAI Textlink Workshop. 2007.

    Google Scholar 

  • S. Javitz, Harold, Valdes, Alfonso: The SRI IDES Statistical Anomaly Detector. In Research in Security and Privacy. Proceedings. IEEE Computer Society Symposium. 1991, p. 316–326.

    Google Scholar 

  • P. Pudilr, F.J. Ferrii, J. Novovicova, J. Kittler: Floating search methods for feature selection with nonmonotonic criterion functions. In Pattern Recognition, Vol. 2 - Conference B: Computer Vision & Image Processing., Proceedings of the 12th IAPR International Conference. 1994, p. 279–283.

    Google Scholar 

  • Yao-Hong Chan, Wing W.Y.Ng, Daniel S. Yeung, Patrick P. K. Chan: Empirical Comparison Of Forward And Backward Search Strategies In L-GEM Based Feature Selection With RBFNN. In Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 2010.

    Google Scholar 

  • P. Somol, P. Pudil, J. Novovicova, P. Paclik: Adaptive Floating search methods in feature selection. In Pattern Recognition Letters 20, 1999, p. 1157–1163

    Article  Google Scholar 

  • Jain, Anil, Zongker, Douglas: Feature Selection: Evaluation, Application, and Small Sample Performance. In IEEE Transactions on Pattern Analysis and Machine Intelligence - PAMI, 1997, vol. 19, no. 2, p. 153–158.

    Article  Google Scholar 

  • Hall, Mark A., Holmes Geoffrey: Benchmarking Attribute Selection Techniques for Discrete Class Data Mining. In IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15, NO. 6, 2003, p. 1437–1447.

    Article  Google Scholar 

  • Daniel S. Yeung, Wing W. Y. Ng, Defeng Wang, Eric C. C. Tsang, Xi-Zhao Wang: Localized Generalization Error Model and Its Application to Architecture Selection for Radial Basis Function Neural Network. In IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 18, NO. 5, 2007, p. 1294–1305.

    Article  Google Scholar 

  • Ratanamahatana, Chotirat: CloNI: Clustering of sqrt(N)-Interval Discretization. In proceedings of the 4th International Conference on Data Mining Including Building Application for CRM & Competitive Intelligence, Rio de Janeiro, Brazil, December 2003.

    Google Scholar 

  • Fayyad, Usama M., Irani, Keki B.: Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning. In Proceedings of the 13th International Joint Conference on Artificial Intelligence, 1993.

    Google Scholar 

  • V. Bolon-Canedo, N. Sanchez-Marofio and A. Alonso-Betanzos: A Combination of Discretization and Filter Methods for Improving Classification Performance in KDD Cup 99 Dataset. In Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14–19, 2009.

    Google Scholar 

  • Sheng-yi Jiang, Xia Li, Qi Zheng, Lian-xi Wang: Approximate Equal Frequency Discretization Method. In Intelligent Systems, GCIS ‹09. WRI Global Congress, 2009, p. 514–518.

    Google Scholar 

  • Dhir, C.S., Iqbal, N., Lee, Soo-Young: Efficient feature selection based on information gain criterion for face recognition. In Information Acquisition, 2007. ICIA ‹07. International Conference, 2007, p. 523–527.

    Google Scholar 

  • Yang Li, Bin-Xing Fang, You Chen, Li Guo: A Lightweight Intrusion Detection Model Based on Feature Selection and Maximum Entropy Model. In Communication Technology, ICCT ‹06. International Conference, 2006, p. 1–4.

    Google Scholar 

  • http://iscx.ca/NSL-KDD/

  • Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten (2009); The WEKA Data Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Salem, M., Bühler, U., Reißmann, S. (2012). Improved Feature Selection Method using SBS-IG-Plus. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2011 Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-8348-8652-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-8652-1_31

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-8348-1911-6

  • Online ISBN: 978-3-8348-8652-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics