Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers

作者: Rania A. Ghazy , El-Sayed M. EL-Rabaie , Moawad I. Dessouky , Nawal A. El-Fishawy , Fathi E. Abd El-Samie

DOI: 10.1007/S11277-018-5662-0

关键词: Data miningComputer scienceIntrusion detection systemDenial-of-service attackClassifier (UML)Feature selection

摘要: With the growth and benefits of network usage, securing networks by using anomaly intrusion detection systems (IDS) against unknown intrusions has become an important issue. The first step protecting any is attacks. In this paper, we concentrate on four attacks; denial service (DoS), probing, remote-to-local, user-to-root We depend features extracted from (NSL-KDD) dataset for these investigate performance attack process several numbers various subset-based feature selection techniques aiming to find optimum collection detecting each with appropriate classifier. Simulation results reveal that redundant can be eliminated process, determine most useful set a certain classifier, which enhances IDS performance.

参考文章(9)
Gholam Reza Zargar, Tania Baghaie, Category-Based Intrusion Detection Using PCA Journal of Information Security. ,vol. 3, pp. 259- 271 ,(2012) , 10.4236/JIS.2012.34033
Huawen Liu, Jigui Sun, Lei Liu, Huijie Zhang, Feature selection with dynamic mutual information Pattern Recognition. ,vol. 42, pp. 1330- 1339 ,(2009) , 10.1016/J.PATCOG.2008.10.028
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Hiroshi Motoda, Rudy Setiono, Huan Liu, Zheng Zhao, Feature Selection: An Ever Evolving Frontier in Data Mining Feature Selection in Data Mining. pp. 4- 13 ,(2010)
Sevil Sen, A Survey of Intrusion Detection Systems Using Evolutionary Computation Bio-Inspired Computation in Telecommunications. pp. 73- 94 ,(2015) , 10.1016/B978-0-12-801538-4.00004-5
Mohamed Faisal Elrawy, T. K. Abdelhamid, A. M. Mohamed, IDS in Telecommunication Network Using PCA International Journal of Computer Networks & Communications. ,vol. 5, pp. 147- 157 ,(2013) , 10.5121/IJCNC.2013.5412
Doodipalli Subramanyam, Classification of Intrusion Detection Dataset using machine learning Approaches 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). ,(2018) , 10.1109/CTEMS.2018.8769270