Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms

被引:1
|
作者
Robinson, R. R. Rejimol [1 ]
Madhav, K. P. Anagha [2 ]
Thomas, Ciza [3 ]
机构
[1] SCT Coll Engn, Comp Sci & Engn, Thiruvananthapuram, Kerala, India
[2] ITI Ltd, Engn, Bangalore, India
[3] Karunya Inst Technol & Sci, Sch Comp Sci & Technol, Coimbatore, Tamil Nadu, India
关键词
CICIDS 2017 data set; correlation-based feature selection; decision tree; information-gain-based feature selection; intrusion detection; minority attacks; NSL-KDD data set;
D O I
10.1111/exsy.13546
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning and Data Mining algorithms are used extensively to enhance the performance of Intrusion Detection Systems. The number of training instances and the dimensionality of data are crucial factors affecting the performance of the model built during the training of any supervised learning algorithms. A sufficient proportion of instances having relevant features from all classes of attacks and normal traffic are considered most desirable while building the classification model that classifies the network traffic into attack and normal. This paper proposes a methodology to improve the accuracy of the model by giving importance to the relevant features that can contribute to model building. The feature selection using correlation-based and information gain-based techniques during training and testing contributes much to the detection of stealthier attacks and minority attacks. Then the features of the less detected attacks are identified as the second phase of the filter that is used to improve the performance. The relevant features of stealthy attacks are identified based on the correlation of corresponding features of the attack and normal data as the attacks are made stealthy mostly by making it resemble the normal traffic. Finally, the attacks that are rarely found in the training data are oversampled to improve their detection. CICIDS 2017 data set is employed as it comprises stealthier attacks generated using modern tools. NSL KDD data set is also used for evaluation to compare the proposed work with existing literature as it is used in most of the available literature. The results show superior performance with an accuracy of 99.8%, false positive rate of 0.2%, and a detection rate and 99.8%.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Ensemble and Feature Selection-based Intrusion Detection System for Multi-attack Environment
    Khonde, S. R.
    Ulagamuthalvi, V
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [32] A Feature Selection Based DNN for Intrusion Detection System
    Li, Li-Hua
    Ahmad, Ramli
    Tsai, Wen-Chung
    Sharma, Alok Kumar
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [33] Feature selection and multiple classifier fusion using genetic algorithms in intrusion detection systems
    Ozgur, Atilla
    Erdem, Hamit
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2018, 33 (01): : 75 - 87
  • [34] Efficient algorithms for intrusion detection
    Boora, NK
    Bhattacharyya, C
    Gopinath, K
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 346 - 352
  • [35] Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT
    Musleh, Dhiaa
    Alotaibi, Meera
    Alhaidari, Fahd
    Rahman, Atta
    Mohammad, Rami M.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (02)
  • [36] Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
    Rania A. Ghazy
    El-Sayed M. EL-Rabaie
    Moawad I. Dessouky
    Nawal A. El-Fishawy
    Fathi E. Abd El-Samie
    Wireless Personal Communications, 2018, 100 : 1689 - 1706
  • [37] Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
    Ghazy, Rania A.
    El-Rabaie, El-Sayed M.
    Dessouky, Moawad I.
    El-Fishawy, Nawal A.
    Abd El-Samie, Fathi E.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1689 - 1706
  • [38] Feature selection using rough set in intrusion detection
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2026 - +
  • [39] Feature Construction Scheme for Efficient Intrusion Detection System
    Kim, Eunhye
    Lee, Seungmin
    Kwon, Kihoon
    Kim, Sehun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (02) : 527 - 547
  • [40] Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach
    Jaw, Ebrima
    Wang, Xueming
    SYMMETRY-BASEL, 2021, 13 (10):