Exploring the Impact of PCA Variants on Intrusion Detection System Performance

被引:0
|
作者
Chentoufi, Oumaima [1 ]
Choukhairi, Mouad [2 ]
Chougdali, Khalid [1 ]
Alloug, Ilyas [1 ]
机构
[1] Ibn Tofail Univ, ENSA Kenitra, Engn Sci Lab, Kenitra, Morocco
[2] Ibn Tofail Univ, LARI, Dept Comp Sci, Kenitra, Morocco
关键词
Intrusion detection; dimensionality reduction; feature extraction; KDDCup'99; NSL-KDD;
D O I
10.14569/IJACSA.2024.0150539
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems (IDS) play a critical role in safeguarding network security by identifying malicious activities within network traffic. However, the effectiveness of an IDS hinges on its ability to extract relevant features from the vast amount of data it collects. This study investigates the impact of different feature extraction methods on the performance of IDS. We compare the performance of various feature extraction techniques on two widely used intrusion detection datasets: KDD Cup 99 and NSL-KDD. By evaluating these techniques on both datasets, we aim to gain insights into the generalizability and robustness of each method across different dataset characteristics. The study compares the performance of these methods using standard metrics like detection rate, F-measure and FPR for intrusion detection.
引用
收藏
页码:392 / 400
页数:9
相关论文
共 50 条
  • [41] Intrusion Detection Model Using fusion of PCA and optimized SVM
    Thaseen, I. Sumaiya
    Kumar, Ch Aswani
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 879 - 884
  • [42] Random Subspace PCA Based Intrusion Detection Classifier Ensemble
    Zhang, Hongmei
    Wang, Xingyu
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 3140 - 3144
  • [43] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [44] Performance Evaluation of Different Intrusion Detection System: An Empirical Approach
    Beigh, Bilal Maqbool
    Peer, M. A.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [45] Feature Engineering Methods in Intrusion Detection System: A Performance Evaluation
    Zare, F.
    Mahmoudi-Nasr, P.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2023, 36 (07): : 1343 - 1353
  • [46] Intrusion detection system based on high-performance networks
    Chen, Xiaosu
    Jiang, Chao
    Xiao, Daoju
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2002, 30 (03):
  • [47] Improving Performance of Mobile Agent Based Intrusion Detection System
    Shah, Bhavin
    Trivedi, Bhushan H.
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 425 - 430
  • [48] Honeypot-Based Intrusion Detection System: A Performance Analysis
    Kondra, Janardhan Reddy
    Bharti, Santosh Kumar
    Mishra, Sambit Kumar
    Babu, Korra Sathya
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2347 - 2351
  • [49] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [50] Network Intrusion Detection Method Based on PCA and Bayes Algorithm
    Zhang, Bing
    Liu, Zhiyang
    Jia, Yanguo
    Ren, Jiadong
    Zhao, Xiaolin
    SECURITY AND COMMUNICATION NETWORKS, 2018,