Mohammed A. Ambusaidi
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Ambusaidi, Mohammed A.; He, Xiangjian; Nanda, Priyadarsi; Tan, Zhiyuan
Abstract
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification but also prevent a classifier from making accurate decisions, especially when coping with big data. In this paper, we propose a mutual information based algorithm that analytically selects the optimal feature for classification. This mutual information based feature selection algorithm can handle linearly and nonlinearly dependent data features. Its effectiveness is evaluated in the cases of network intrusion detection. An Intrusion Detection System (IDS), named Least Square Support Vector Machine based IDS (LSSVM-IDS), is built using the features selected by our proposed feature selection algorithm. The performance of LSSVM-IDS is evaluated using three intrusion detection evaluation datasets, namely KDD Cup 99, NSL-KDD and Kyoto 2006+ dataset. The evaluation results show that our feature selection algorithm contributes more critical features for LSSVM-IDS to achieve better accuracy and lower computational cost compared with the state-of-the-art methods.
Citation
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Journal Article Type | Article |
---|---|
Acceptance Date | Jan 10, 2016 |
Online Publication Date | Jan 19, 2016 |
Publication Date | Oct 1, 2016 |
Deposit Date | Nov 15, 2016 |
Publicly Available Date | Nov 18, 2016 |
Journal | IEEE Transactions on Computers |
Print ISSN | 0018-9340 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 65 |
Issue | 10 |
Pages | 2986-2998 |
DOI | https://doi.org/10.1109/tc.2016.2519914 |
Keywords | Theoretical Computer Science; Hardware and Architecture; Computational Theory and Mathematics; Software |
Public URL | http://researchrepository.napier.ac.uk/Output/424371 |
Contract Date | Nov 18, 2016 |
Files
Building an intrusion detection system...
(836 Kb)
PDF
Copyright Statement
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works."
You might also like
How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction
(2024)
Presentation / Conference Contribution
Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy
(2024)
Presentation / Conference Contribution
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme
(2024)
Presentation / Conference Contribution
Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware
(2024)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search