A new feature selection model based on ID3 and bees algorithm for intrusion detection system

作者: Adel Sabry EESA , Zeynep ORMAN , Adnan Mohsin Abdulazeez BRIFCANI

DOI: 10.3906/ELK-1302-53

关键词: Constant false alarm ratePattern recognitionData miningClassifier (UML)Information securityFeature selectionIntrusion detection systemID3 algorithmID3Artificial intelligenceComputer scienceBees algorithm

摘要: Intrusion detection systems (IDSs) have become a necessary component of computers and information security framework. IDSs commonly deal with large amount data traffic these may contain redundant unimportant features. Choosing the best quality features that represent all exclude is crucial topic in IDSs. In this paper, new combination approach based on ID3 algorithm bees (BA) proposed to select optimal subset for an IDS. The BA used generate features, as classifier. model applied KDD Cup 99 dataset. obtained results show feature generated by ID3-BA gives higher accuracy rate lower false alarm when compared using

参考文章(14)
Noelia Sánchez-Maroño, Beatriz Pérez-Sánchez, Amparo Alonso-Betanzos, Juan A. Suárez-Romero, Félix M. Carballal-Fortes, Classification of computer intrusions using functional networks. A comparative study. the european symposium on artificial neural networks. pp. 579- 584 ,(2007)
Xiangyang Wang, Jie Yang, Xiaolong Teng, Weijun Xia, Richard Jensen, Feature selection based on rough sets and particle swarm optimization Pattern Recognition Letters. ,vol. 28, pp. 459- 471 ,(2007) , 10.1016/J.PATREC.2006.09.003
Xing-Yu Wang, Hong-mei Zhang, Hai-Hua Gao, Quantum Particle swarm optimization based network Intrusion feature selection and Detection IFAC Proceedings Volumes. ,vol. 41, pp. 12312- 12317 ,(2008) , 10.3182/20080706-5-KR-1001.02084
Mohammad Ehsan Basiri, Nasser Ghasem-Aghaee, Mehdi Hosseinzadeh Aghdam, Using ant colony optimization-based selected features for predicting post-synaptic activity in proteins evolutionary computation machine learning and data mining in bioinformatics. pp. 12- 23 ,(2008) , 10.1007/978-3-540-78757-0_2
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Marius Kloft, Ulf Brefeld, Patrick Düessel, Christian Gehl, Pavel Laskov, Automatic feature selection for anomaly detection Proceedings of the 1st ACM workshop on Workshop on AISec - AISec '08. pp. 71- 76 ,(2008) , 10.1145/1456377.1456395
Yehuda Lindell, Benny Pinkas, Secure Multiparty Computation for Privacy-Preserving Data Mining Journal of Privacy and Confidentiality. ,vol. 1, pp. 5- ,(2009) , 10.29012/JPC.V1I1.566
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Ajith Abraham, None, Ensemble of One-Class Classifiers for Network Intrusion Detection System information assurance and security. pp. 180- 185 ,(2008) , 10.1109/IAS.2008.35
M. J. Fadaeieslam, B. Minaei-Bidgoli, M. Fathy, M. Soryani, Comparison of Two Feature Selection Methods in Intrusion Detection Systems computer and information technology. pp. 83- 86 ,(2007) , 10.1109/CIT.2007.99