Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms

被引:1
|
作者
Robinson, R. R. Rejimol [1 ]
Madhav, K. P. Anagha [2 ]
Thomas, Ciza [3 ]
机构
[1] SCT Coll Engn, Comp Sci & Engn, Thiruvananthapuram, Kerala, India
[2] ITI Ltd, Engn, Bangalore, India
[3] Karunya Inst Technol & Sci, Sch Comp Sci & Technol, Coimbatore, Tamil Nadu, India
关键词
CICIDS 2017 data set; correlation-based feature selection; decision tree; information-gain-based feature selection; intrusion detection; minority attacks; NSL-KDD data set;
D O I
10.1111/exsy.13546
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning and Data Mining algorithms are used extensively to enhance the performance of Intrusion Detection Systems. The number of training instances and the dimensionality of data are crucial factors affecting the performance of the model built during the training of any supervised learning algorithms. A sufficient proportion of instances having relevant features from all classes of attacks and normal traffic are considered most desirable while building the classification model that classifies the network traffic into attack and normal. This paper proposes a methodology to improve the accuracy of the model by giving importance to the relevant features that can contribute to model building. The feature selection using correlation-based and information gain-based techniques during training and testing contributes much to the detection of stealthier attacks and minority attacks. Then the features of the less detected attacks are identified as the second phase of the filter that is used to improve the performance. The relevant features of stealthy attacks are identified based on the correlation of corresponding features of the attack and normal data as the attacks are made stealthy mostly by making it resemble the normal traffic. Finally, the attacks that are rarely found in the training data are oversampled to improve their detection. CICIDS 2017 data set is employed as it comprises stealthier attacks generated using modern tools. NSL KDD data set is also used for evaluation to compare the proposed work with existing literature as it is used in most of the available literature. The results show superior performance with an accuracy of 99.8%, false positive rate of 0.2%, and a detection rate and 99.8%.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Feature Selection Algorithms in Intrusion Detection System: A Survey
    Maza, Sofiane
    Touahria, Mohamed
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10): : 5079 - 5099
  • [2] Probe Attack Detection Using an Improved Intrusion Detection System
    Almazyad, Abdulaziz
    Halman, Laila
    Alsaeed, Alaa
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 4769 - 4784
  • [3] Comparative Study for Feature Selection Algorithms in Intrusion Detection System
    Anusha, K.
    Sathiyamoorthy, E.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (01) : 1 - 9
  • [4] Survey and taxonomy of feature selection algorithms in intrusion detection system
    Chen, You
    Li, Yang
    Cheng, Xue-Qi
    Guo, Li
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 153 - +
  • [5] An Efficient Feature Selection Approach for Intrusion Detection System using Decision Tree
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 646 - 656
  • [6] An Intrusion Detection System Using Unsupervised Feature Selection
    Suman, Chanchal
    Tripathy, Somanath
    Saha, Sriparna
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 19 - 24
  • [7] Performance Enhancement of Intrusion Detection System Using Machine Learning Algorithms with Feature Selection
    Raju, Anuradha Samkham
    Rashid, Md Mamunur
    Sabrina, Fariza
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 34 - 39
  • [8] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Biradar, Rajkumar Laxmikanth
    THEORETICAL COMPUTER SCIENCE, 2022, 931 : 56 - 64
  • [9] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Laxmikanth Biradar, Rajkumar
    Theoretical Computer Science, 2022, 931 : 56 - 64
  • [10] Efficient Feature Selection for Intrusion Detection Systems
    Ahmadi, S. Sareh
    Rashad, Sherif
    Elgazzar, Heba
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1029 - 1034