Abstract
In order to solve the problem of high data dimension in network intrusion detection, the paper proposes KNN classifier and two kinds of effective feature selection algorithms that include Automatic encoder (Autoencoder) and Principal Component Analysis (PCA). The algorithms that the paper proposes will be applied in the field of network intrusion detection. First of all, we combine the KNN classifier with the effective feature selection algorithms to form a novel intrusion detection model. Secondly, we input the preprocessed data into the model. Finally, the experimental results show that the combination of KNN classifier and Autoencoder (KNN-Autoencoder) makes the accuracy of intrusion detection reach 93%, and the combination of KNN classifier and PCA (KNN-PCA) makes the accuracy of intrusion detection reach 91%. Apparently, the efficient feature selection algorithms can effectively reduce the impact of non-related attributes on the classification results. The performance of the automatic encoder is better than the principal component analysis. All experiments are done based on the KDD UP99 data set.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bloede, K., Mischou, G., Senan, A., Koontz, R.: The Internet of Things. Woodside Capital Partners (2015). http://www.woodsidecap.com/wp-content/uploads/2015/03/WCP-IOT-M_and_A-REPORT-2015-3.pdf. Accessed 27 Oct 2016. Elissa, K.: Title of paper if known, unpublished
Divakaran, D.M., et al.: Evidence gathering for network security and forensics. Digit. Invest. 20, 56–65 (2017)
Maxwell, J.C.: A Treatise on Electricity and Magnetism, vol. 2, 3rd edn. Clarendon, Oxford (1892)
Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev., 68–73, in press
Hoz, E.D.L., Hoz, E.D.L., Ortiz, A., et al.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl. Based Syst. 71, 322–338 (2014)
Wang, G., Hao, J., Ma, J., et al.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225–6323 (2010)
Chitraker, R., Huang, C.: Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput. Secur. 45(3), 231–241 (2014)
Hinton, G.E., Salakhudinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)
PCA indexing based feature learning and feature selection
Cheryadat, A.M.: Unsupervised feature learning for aerial scene classification. IEEE Trans. Geosci. Remote Sens. 52(1), 439–451 (2014)
Lakhina, S., Joseph, S., Verma, B.: Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD. Int. J. Eng. Sci. Technol. 2(6), 1790–1799 (2010)
Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(4), 178–184 (2014)
Kuang, F., Xu, W., Wnag, Y.: A novel approach of KPCA and SVM for intrusion detection. J. Comput. Inf. Syst. 8(8), 3237–3244 (2012)
Aung, Y., Min, M.: An analysis of random forest algorithm based network intrusion detection system. In: 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Kanazawa, Japan, pp. 127–132 (2017)
Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, pp. 635–638 (2017)
Stolfo, S.J., Fan, W., Lee, W.K., et al.: Cost-based modeling for fraud and intrusion detection: results from the jam project [EB/OL]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
ACKNOWLEDGEMENT
This work was supported by Shandong provincial Natural Science Foundation, China (************) and by Key Research and Development Plan of Shandong Province (*************).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dong, S., Wang, X. (2018). Research on Network Intrusion Data Based on KNN and Feature Extraction Algorithm. In: Zhou, Q., Gan, Y., Jing, W., Song, X., Wang, Y., Lu, Z. (eds) Data Science. ICPCSEE 2018. Communications in Computer and Information Science, vol 901. Springer, Singapore. https://doi.org/10.1007/978-981-13-2203-7_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-2203-7_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2202-0
Online ISBN: 978-981-13-2203-7
eBook Packages: Computer ScienceComputer Science (R0)