Enhancing Wireless Intrusion Detection Using Machine Learning Classification with Reduced Attribute Sets

作者: Razan Abdulhammed , Miad Faezipour , Abdelshakour Abuzneid , Ali Alessa

DOI: 10.1109/IWCMC.2018.8450479

关键词:

摘要: In cybersecurity, machine learning approaches can predict and detect threats before they result in major security incidents. The design perform ance of an effective based Intrusion Detection System (IDS) depends upon the selected attributes classifier model. This paper considers multi-class classification for Aegean Wi-Fi Dataset (AWID) where classes represent 17 types IEEE 802.11 MAC Layer attacks. proposed work extracts four attribute sets 32, 10, 7 5 attributes, resp ectfully. classifiers achieved high accuracy with minimum false positive rates, presented outperforms previous related terms number classes, accuracy. maximum 99.64% Random Forest supply test 99.99% usi ng 10-fold cross validation approach J48.

参考文章(15)
M. Hall, Correlation-based Feature Selection for Machine Learning PhD Thesis, Waikato Univer-sity. ,(1998)
Shailendra Sahu, B M Mehtre, Network intrusion detection system using J48 Decision Tree advances in computing and communications. pp. 2023- 2026 ,(2015) , 10.1109/ICACCI.2015.7275914
Jesse Davis, Mark Goadrich, The relationship between Precision-Recall and ROC curves Proceedings of the 23rd international conference on Machine learning - ICML '06. ,vol. 148, pp. 233- 240 ,(2006) , 10.1145/1143844.1143874
Jerome Friedman, Trevor Hastie, Robert Tibshirani, Additive logistic regression: a statistical view of boosting (With discussion and a rejoinder by the authors) Annals of Statistics. ,vol. 28, pp. 337- 407 ,(2000) , 10.1214/AOS/1016218223
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis, Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset IEEE Communications Surveys and Tutorials. ,vol. 18, pp. 184- 208 ,(2016) , 10.1109/COMST.2015.2402161
Ren Diao, Qiang Shen, Feature Selection With Harmony Search systems man and cybernetics. ,vol. 42, pp. 1509- 1523 ,(2012) , 10.1109/TSMCB.2012.2193613
Saurabh Mukherjee, Neelam Sharma, INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION Procedia Technology. ,vol. 4, pp. 119- 128 ,(2012) , 10.1016/J.PROTCY.2012.05.017
Lei Xu, Pingfan Yan, Tong Chang, Best first strategy for feature selection international conference on pattern recognition. pp. 706- 708 ,(1988) , 10.1109/ICPR.1988.28334
Yingbo Liu, Jiujun Cheng, Chendan Yan, Xiao Wu, Fuzhen Chen, Research on the Matthews Correlation Coefficients Metrics of Personalized Recommendation Algorithm Evaluation International Journal of Hybrid Information Technology. ,vol. 8, pp. 163- 172 ,(2015) , 10.14257/IJHIT.2015.8.1.14
Udaya Sampath Karunathilaka Perera, Miriya Thanthrige, Hidden Markov Model Based Intrusion Alert Prediction ,(2016)