A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective

被引:16
|
作者
Varma, P. Ravi Kiran [1 ]
Kumari, V. Valli [2 ]
Kumar, S. Srinivas [3 ]
机构
[1] MVGR Coll Engn, Vizianagaram, Andhra Pradesh, India
[2] Andhra Univ Coll Engn, Visakhapatnam, Andhra Pradesh, India
[3] JNT Univ, Univ Coll Engn Kakinada, Kakinada, Andhra Pradesh, India
关键词
Intrusion detection system; IDS; Feature selection; Soft computing; Survey; ROUGH SET-THEORY;
D O I
10.1007/978-981-10-7871-2_75
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the process of detecting different kinds of attacks in anomaly-based intrusion detection system (IDS), both normal and attack data are profiled with the help of selected attributes. Various types of attributes are collected to create the attack and normal traffic patterns. Some of the attributes are derived from protocol header fields, and some of them represent continuous information profiled over a period. "Curse of Dimensionality" is one of the major issues in IDS. The computational complexity of the model generation and classification time of IDS is directly proportional to the number of attributes of the profile. In a typical IDS preprocessing stage, more significant features among the available features are selected. This paper presents a brief taxonomy of several feature selection methods with emphasis on soft computing techniques, viz., rough sets, fuzzy rough sets, and ant colony optimization.
引用
收藏
页码:785 / 793
页数:9
相关论文
共 50 条
  • [21] Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
    Satheesh Narayanasami
    Sudhakar Sengan
    Saira Khurram
    Farrukh Arslan
    Suresh Kumar Murugaiyan
    Regin Rajan
    Vijayakumar Peroumal
    Anil Kumar Dubey
    Sujatha Srinivasan
    Dilip Kumar Sharma
    Wireless Personal Communications, 2022, 127 : 1763 - 1785
  • [22] Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
    Almaghthawi, Yousef
    Ahmad, Iftikhar
    Alsaadi, Fawaz E. E.
    MATHEMATICS, 2022, 10 (24)
  • [23] Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
    Narayanasami, Satheesh
    Sengan, Sudhakar
    Khurram, Saira
    Arslan, Farrukh
    Murugaiyan, Suresh Kumar
    Rajan, Regin
    Peroumal, Vijayakumar
    Dubey, Anil Kumar
    Srinivasan, Sujatha
    Sharma, Dilip Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1763 - 1785
  • [25] Unsupervised Feature Selection Method for Intrusion Detection System
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 295 - 301
  • [26] A Feature Selection Based DNN for Intrusion Detection System
    Li, Li-Hua
    Ahmad, Ramli
    Tsai, Wen-Chung
    Sharma, Alok Kumar
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [27] An Intrusion Detection System Using Unsupervised Feature Selection
    Suman, Chanchal
    Tripathy, Somanath
    Saha, Sriparna
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 19 - 24
  • [28] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [29] Soft Computing Techniques for Intrusion Detection of SQL-Based Attacks
    Skaruz, Jaroslaw
    Nowacki, Jerzy Pawel
    Drabik, Aldona
    Seredynski, Franciszek
    Bouvry, Pascal
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT I, PROCEEDINGS, 2010, 5990 : 33 - +
  • [30] A survey of intrusion detection techniques based on negative selection algorithm
    Kuldeep Singh
    Lakhwinder Kaur
    Raman Maini
    International Journal of System Assurance Engineering and Management, 2022, 13 : 175 - 185