Exploring the Impact of PCA Variants on Intrusion Detection System Performance

被引:0
|
作者
Chentoufi, Oumaima [1 ]
Choukhairi, Mouad [2 ]
Chougdali, Khalid [1 ]
Alloug, Ilyas [1 ]
机构
[1] Ibn Tofail Univ, ENSA Kenitra, Engn Sci Lab, Kenitra, Morocco
[2] Ibn Tofail Univ, LARI, Dept Comp Sci, Kenitra, Morocco
关键词
Intrusion detection; dimensionality reduction; feature extraction; KDDCup'99; NSL-KDD;
D O I
10.14569/IJACSA.2024.0150539
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems (IDS) play a critical role in safeguarding network security by identifying malicious activities within network traffic. However, the effectiveness of an IDS hinges on its ability to extract relevant features from the vast amount of data it collects. This study investigates the impact of different feature extraction methods on the performance of IDS. We compare the performance of various feature extraction techniques on two widely used intrusion detection datasets: KDD Cup 99 and NSL-KDD. By evaluating these techniques on both datasets, we aim to gain insights into the generalizability and robustness of each method across different dataset characteristics. The study compares the performance of these methods using standard metrics like detection rate, F-measure and FPR for intrusion detection.
引用
收藏
页码:392 / 400
页数:9
相关论文
共 50 条
  • [1] The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection
    Thi-Thu-Huong Le
    Kang, Hyeoun
    Kim, Howon
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 30 - 35
  • [2] Intrusion detection system using PCA and kernel PCA methods
    Chougdali, K. (chougdali@yahoo.fr), 1600, International Association of Engineers (43):
  • [3] Intrusion Detection System Using PCA and Kernel PCA Methods
    Elkhadir, Zyad
    Chougdali, Khalid
    Benattou, Mohammed
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 489 - 497
  • [4] Intrusion Detection System using PCA and Fuzzy PCA Techniques
    Hadri, Amal
    Chougdali, Khalid
    Touahni, Rajae
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), 2016, : 111 - 117
  • [5] An optimized intrusion detection system using PCA and BNN
    Dong Seong Kim
    Ha-Nam Nguyen
    Thandar Thein
    Jong Son Park
    APSITT 2005: 6TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, PROCEEDINGS, 2005, : 356 - 359
  • [6] A Comparative Performance Evaluation of Intrusion Detection based on Neural Network and PCA
    Sonawane, Harshal A.
    Pattewar, Tareek M.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 841 - 845
  • [7] Performance Evaluation of an Intrusion Detection System
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    El Farissi, Ilhame
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 509 - 517
  • [8] Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
    Raja, Sivakami
    Pran, S. Gokul
    Pandeeswari, N.
    Kiruthiga, P.
    Nithya, D.
    MuthuPandi, G.
    EAI Endorsed Transactions on Energy Web, 2021, 8 (36): : 1 - 5
  • [9] Deep Neural Network-Based Intrusion Detection System through PCA
    Alotaibi, Shoayee Dlaim
    Yadav, Kusum
    Aledaily, Arwa N.
    Alkwai, Lulwah M.
    Dafhalla, Alaa Kamal Yousef
    Almansour, Shahad
    Lingamuthu, Velmurugan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [10] Addressing Challenges for Intrusion Detection System using Naive Bayes and PCA Algorithm
    Almansob, Saqr Mohammed
    Lomte, Santosh Shivajirao
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 565 - 568