Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System

被引:5
|
作者
Damtew, Yeshalem Gezahegn [1 ,2 ]
Chen, Hongmei [1 ]
Yuan, Zhong [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu 611756, Peoples R China
[2] Debre Berhan Univ, Coll Comp Sci, Debre Berhan 445, Ethiopia
关键词
Feature selection; Machine learning; Network intrusion detection system; MUTUAL INFORMATION; ALGORITHM;
D O I
10.1007/s44196-022-00174-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems get more attention to secure the computers and network systems. Researchers propose different network intrusion detection systems using machine learning techniques. However, the massive amount of data that contain irrelevant and redundant features is still challenging the intrusion detection systems. The redundancy and irrelevance of features may slow the processing time and decrease prediction performance. This paper proposes a Heterogeneous Ensemble Feature Selection (HEFS) method to select the relevant features while achieving better attack detection performance. The proposed method fuses the output feature subsets of five filter feature selection methods, using a union combination method, to obtain an ensemble features subset. HEFS method uses merit-based evaluation to avoid the internal redundancy of the obtained ensemble features subset and acquire the final optimal features. We evaluate the HEFS method with random forest, J48, random tree, and REP tree. In a multi-class NSL-KDD dataset, the experimental results show that the proposed method achieves better prediction performance than the specific feature selection methods and other frameworks.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
    Nandhini, U.
    Kumar, S. V. N. Santhosh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [22] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [23] Intrusion Detection System using Bayesian Network and Feature Subset Selection
    Jabbar, M. A.
    Aluvalu, Rajanikanth
    Reddy, S. Sai Satyanarayana
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 640 - 644
  • [24] Majority Voting and Feature Selection Based Network Intrusion Detection System
    Patil, Dharmaraj R.
    Pattewar, Tareek M.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06):
  • [25] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Seung-Ho Kang
    Kuinam J. Kim
    Cluster Computing, 2016, 19 : 325 - 333
  • [26] Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach
    Jaw, Ebrima
    Wang, Xueming
    SYMMETRY-BASEL, 2021, 13 (10):
  • [27] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Kang, Seung-Ho
    Kim, Kuinam J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 325 - 333
  • [28] Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection
    Mananayaka, Asanka Kavinda
    Chung, Sun Sunnie
    IEEE ACCESS, 2023, 11 : 45154 - 45167
  • [29] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    Krishnaveni, S.
    Sivamohan, S.
    Sridhar, S. S.
    Prabakaran, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1761 - 1779
  • [30] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    S. Krishnaveni
    S. Sivamohan
    S. S. Sridhar
    S. Prabakaran
    Cluster Computing, 2021, 24 : 1761 - 1779