Network intrusion detection system based on recursive feature addition and bigram technique

作者: Tarfa Hamed , Rozita Dara , Stefan C. Kremer

DOI: 10.1016/J.COSE.2017.10.011

关键词:

摘要: Abstract Network and Internet security is a critical universal issue. The increased rate of cyber terrorism has put national under risk. In addition, attacks have caused severe damages to different sectors (i.e., individuals, economy, enterprises, organizations governments). Intrusion Detection Systems (NIDS) are one the solutions against these attacks. However, NIDS always need improve their performance in terms increasing accuracy decreasing false alarms. Integrating feature selection with intrusion detection shown be successful approach since can help selecting most informative features from entire set features. Usually, for stealthy low profile (zero – day attacks), there few neatly concealed packets distributed over long period time mislead firewalls NIDS. Besides, many extracted those packets, which may make some machine learning-based methods suffer overfitting especially when data large numbers relatively small examples. this paper, we proposing based on method called Recursive Feature Addition (RFA) bigram technique. system been designed, implemented tested. We tested model ISCX 2012 set, well-known recent sets purposes. Furthermore, technique encode payload string into useful representation that used selection. propose new evaluation metric (combined) combines accuracy, alarm way helps comparing systems best among them. designed selection-based noticeable improvement using metrics.

参考文章(51)
Zeinab Heidarian, , Naser Movahedinia, Neda Moghim, Payam Mahdinia, Intrusion Detection Based on Normal Traffic Specifications International Journal of Computer Network and Information Security. ,vol. 7, pp. 32- 38 ,(2015) , 10.5815/IJCNIS.2015.09.04
Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar, Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset Security and Communication Networks. ,vol. 8, pp. 3441- 3458 ,(2015) , 10.1002/SEC.1269
Qin Yang, Elham Salehi, Robin Gras, Using feature selection approaches to find the dependent features international conference on artificial intelligence and soft computing. pp. 487- 494 ,(2010) , 10.1007/978-3-642-13208-7_61
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
C G Priya, P Uday Babu, R Visakh, Survey on Intrusion Detection Techniques Using Data-Mining Domain International journal of engineering research and technology. ,vol. 3, ,(2014)
George H John, Ron Kohavi, Karl Pfleger, None, Irrelevant Features and the Subset Selection Problem Machine Learning Proceedings 1994. pp. 121- 129 ,(1994) , 10.1016/B978-1-55860-335-6.50023-4
Wangshu Liu, Shulong Liu, Qing Gu, Xiang Chen, Daoxu Chen, FECS: A Cluster Based Feature Selection Method for Software Fault Prediction with Noises computer software and applications conference. ,vol. 2, pp. 276- 281 ,(2015) , 10.1109/COMPSAC.2015.66
Thomas Bernecker, Michael E. Houle, Hans-Peter Kriegel, Peer Kröger, Matthias Renz, Erich Schubert, Arthur Zimek, Quality of similarity rankings in time series symposium on large spatial databases. pp. 422- 440 ,(2011) , 10.1007/978-3-642-22922-0_25
Luís PF Garcia, André CPLF de Carvalho, Ana C Lorena, None, Effect of label noise in the complexity of classification problems Neurocomputing. ,vol. 160, pp. 108- 119 ,(2015) , 10.1016/J.NEUCOM.2014.10.085