Title :
A new dependency and correlation analysis for features
Author :
Qu, Guangzhi ; Hariri, Salim ; Yousif, Mazin
Author_Institution :
Dept. of Electr. & Comput. Eng., Arizona Univ., Tucson, AZ, USA
Abstract :
The quality of the data being analyzed is a critical factor that affects the accuracy of data mining algorithms. There are two important aspects of the data quality, one is relevance and the other is data redundancy. The inclusion of irrelevant and redundant features in the data mining model results in poor predictions and high computational overhead. This paper presents an efficient method concerning both the relevance of the features and the pairwise features correlation in order to improve the prediction and accuracy of our data mining algorithm. We introduce a new feature correlation metric QY(Xi,Xj) and feature subset merit measure e(S) to quantify the relevance and the correlation among features with respect to a desired data mining task (e.g., detection of an abnormal behavior in a network service due to network attacks). Our approach takes into consideration not only the dependency among the features, but also their dependency with respect to a given data mining task. Our analysis shows that the correlation relationship among features depends on the decision task and, thus, they display different behaviors as we change the decision task. We applied our data mining approach to network security and validated it using the DARPA KDD99 benchmark data set. Our results show that, using the new decision dependent correlation metric, we can efficiently detect rare network attacks such as User to Root (U2R) and Remote to Local (R2L) attacks. The best reported detection rates for U2R and R2L on the KDD99 data sets were 13.2 percent and 8.4 percent with 0.5 percent false alarm, respectively. For U2R attacks, our approach can achieve a 92.5 percent detection rate with a false alarm of 0.7587 percent. For R2L attacks, our approach can achieve a 92.47 percent detection rate with a false alarm of 8.35 percent.
Keywords :
computer crime; correlation theory; data analysis; data mining; feature extraction; learning (artificial intelligence); pattern classification; statistical analysis; DARPA KDD99 benchmark data set; R2L attack; Remote to Local attack; U2R attack; User to Root attack; correlation analysis; correlation measure; data mining algorithm; data quality; data redundancy; decision task; false alarm; feature extraction; feature subset merit measure; network attacks; network security; pairwise feature correlation metric; Accuracy; Algorithm design and analysis; Data analysis; Data mining; Data security; Displays; Feature extraction; Machine learning; Machine learning algorithms; Predictive models; Index Terms- Feature extraction; correlation measure.;
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
DOI :
10.1109/TKDE.2005.136