Skip to main content

Research on Network Intrusion Data Based on KNN and Feature Extraction Algorithm

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 901))

Abstract

In order to solve the problem of high data dimension in network intrusion detection, the paper proposes KNN classifier and two kinds of effective feature selection algorithms that include Automatic encoder (Autoencoder) and Principal Component Analysis (PCA). The algorithms that the paper proposes will be applied in the field of network intrusion detection. First of all, we combine the KNN classifier with the effective feature selection algorithms to form a novel intrusion detection model. Secondly, we input the preprocessed data into the model. Finally, the experimental results show that the combination of KNN classifier and Autoencoder (KNN-Autoencoder) makes the accuracy of intrusion detection reach 93%, and the combination of KNN classifier and PCA (KNN-PCA) makes the accuracy of intrusion detection reach 91%. Apparently, the efficient feature selection algorithms can effectively reduce the impact of non-related attributes on the classification results. The performance of the automatic encoder is better than the principal component analysis. All experiments are done based on the KDD UP99 data set.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bloede, K., Mischou, G., Senan, A., Koontz, R.: The Internet of Things. Woodside Capital Partners (2015). http://www.woodsidecap.com/wp-content/uploads/2015/03/WCP-IOT-M_and_A-REPORT-2015-3.pdf. Accessed 27 Oct 2016. Elissa, K.: Title of paper if known, unpublished

  2. Divakaran, D.M., et al.: Evidence gathering for network security and forensics. Digit. Invest. 20, 56–65 (2017)

    Article  Google Scholar 

  3. Maxwell, J.C.: A Treatise on Electricity and Magnetism, vol. 2, 3rd edn. Clarendon, Oxford (1892)

    MATH  Google Scholar 

  4. Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev., 68–73, in press

    Google Scholar 

  5. Hoz, E.D.L., Hoz, E.D.L., Ortiz, A., et al.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl. Based Syst. 71, 322–338 (2014)

    Article  Google Scholar 

  6. Wang, G., Hao, J., Ma, J., et al.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225–6323 (2010)

    Article  Google Scholar 

  7. Chitraker, R., Huang, C.: Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput. Secur. 45(3), 231–241 (2014)

    Article  Google Scholar 

  8. Hinton, G.E., Salakhudinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)

    Article  MathSciNet  Google Scholar 

  9. PCA indexing based feature learning and feature selection

    Google Scholar 

  10. Cheryadat, A.M.: Unsupervised feature learning for aerial scene classification. IEEE Trans. Geosci. Remote Sens. 52(1), 439–451 (2014)

    Article  Google Scholar 

  11. Lakhina, S., Joseph, S., Verma, B.: Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD. Int. J. Eng. Sci. Technol. 2(6), 1790–1799 (2010)

    Google Scholar 

  12. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(4), 178–184 (2014)

    Article  Google Scholar 

  13. Kuang, F., Xu, W., Wnag, Y.: A novel approach of KPCA and SVM for intrusion detection. J. Comput. Inf. Syst. 8(8), 3237–3244 (2012)

    Google Scholar 

  14. Aung, Y., Min, M.: An analysis of random forest algorithm based network intrusion detection system. In: 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Kanazawa, Japan, pp. 127–132 (2017)

    Google Scholar 

  15. Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, pp. 635–638 (2017)

    Google Scholar 

  16. Stolfo, S.J., Fan, W., Lee, W.K., et al.: Cost-based modeling for fraud and intrusion detection: results from the jam project [EB/OL]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Download references

ACKNOWLEDGEMENT

This work was supported by Shandong provincial Natural Science Foundation, China (************) and by Key Research and Development Plan of Shandong Province (*************).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shuai Dong or Xingang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dong, S., Wang, X. (2018). Research on Network Intrusion Data Based on KNN and Feature Extraction Algorithm. In: Zhou, Q., Gan, Y., Jing, W., Song, X., Wang, Y., Lu, Z. (eds) Data Science. ICPCSEE 2018. Communications in Computer and Information Science, vol 901. Springer, Singapore. https://doi.org/10.1007/978-981-13-2203-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2203-7_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2202-0

  • Online ISBN: 978-981-13-2203-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics