Numerical Feature Selection and Hyperbolic Tangent Feature Scaling in Machine Learning-Based Detection of Anomalies in the Computer Network Behavior

被引:5
|
作者
Protic, Danijela [1 ]
Stankovic, Miomir [2 ]
Prodanovic, Radomir [1 ]
Vulic, Ivan [3 ]
Stojanovic, Goran M. [4 ]
Simic, Mitar [4 ]
Ostojic, Gordana [4 ]
Stankovski, Stevan [4 ]
机构
[1] Ctr Appl Math & Elect, Belgrade 11000, Serbia
[2] Math Inst SASA, Belgrade 11000, Serbia
[3] Univ Def, Mil Acad, Belgrade 11042, Serbia
[4] Univ Novi Sad, Fac Tech Sci, Novi Sad 21000, Serbia
关键词
machine learning; binary classification; intrusion detection; feature scaling; feature selection; INTRUSION DETECTION SYSTEM; MUTUAL INFORMATION; DECISION TREE; PERFORMANCE; ALGORITHMS;
D O I
10.3390/electronics12194158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly-based intrusion detection systems identify the computer network behavior which deviates from the statistical model of typical network behavior. Binary classifiers based on supervised machine learning are very accurate at classifying network data into two categories: normal traffic and anomalous activity. Most problems with supervised learning are related to the large amount of data required to train the classifiers. Feature selection can be used to reduce datasets. The goal of feature selection is to select a subset of relevant input features to optimize the evaluation and improve performance of a given classifier. Feature scaling normalizes all features to the same range, preventing the large size of features from affecting classification models or other features. The most commonly used supervised machine learning models, including decision trees, support vector machine, k-nearest neighbors, weighted k-nearest neighbors and feedforward neural network, can all be improved by using feature selection and feature scaling. This paper introduces a new feature scaling technique based on a hyperbolic tangent function and damping strategy of the Levenberg-Marquardt algorithm.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Machine learning-based intrusion detection: feature selection versus feature extraction
    Ngo, Vu-Duc
    Vuong, Tuan-Cuong
    Van Luong, Thien
    Tran, Hung
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2365 - 2379
  • [2] Machine Learning-Based Feature Extraction and Selection
    Ruano-Ordas, David
    APPLIED SCIENCES-BASEL, 2024, 14 (15):
  • [3] A Machine Learning-Based Wrapper Method for Feature Selection
    Patel, Damodar
    Saxena, Amit
    Wang, John
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2024, 20 (01)
  • [4] Quantum computer based feature selection in machine learning
    Hellstern, Gerhard
    Dehn, Vanessa
    Zaefferer, Martin
    IET QUANTUM COMMUNICATION, 2024, 5 (03): : 232 - 252
  • [5] An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
    Fei, Chao
    Xia, Nian
    Tsai, Pang-Wei
    Lu, Yang
    Pan, Xiaonan
    Gong, Junli
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 91 - 98
  • [6] Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches
    Beigi, Elaheh Biglar
    Jazi, Hossein Hadian
    Stakhanova, Natalia
    Ghorbani, Ali A.
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 247 - 255
  • [7] Reviewing various feature selection techniques in machine learning-based botnet detection
    Baruah, Sangita
    Borah, Dhruba Jyoti
    Deka, Vaskar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [8] Machine Learning-Based Cardiovascular Disease Detection Using Optimal Feature Selection
    Ullah, Tahseen
    Ullah, Syed Irfan
    Ullah, Khalil
    Ishaq, Muhammad
    Khan, Ahmad
    Ghadi, Yazeed Yasin
    Algarni, Abdulmohsen
    IEEE ACCESS, 2024, 12 : 16431 - 16446
  • [9] Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber Attacks
    Feng, Yaokai
    Akiyama, Hitoshi
    Lu, Liang
    Sakurai, Kouichi
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 173 - 180
  • [10] INTRUSION DETECTION BASED ON MACHINE LEARNING AND FEATURE SELECTION
    Alaoui, Souad
    El Gonnouni, Amina
    Lyhyaoui, Abdelouahid
    MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 199 - 206