DocumentCode :
255958
Title :
Combinational feature selection approach for network intrusion detection system
Author :
Garg, T. ; Kumar, Y.
Author_Institution :
Centre for Comput. Sci. & Technol., Central Univ. of Punjab, Bathinda, India
fYear :
2014
fDate :
11-13 Dec. 2014
Firstpage :
82
Lastpage :
87
Abstract :
In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn´t have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance.
Keywords :
Boolean functions; feature selection; pattern classification; security of data; Boolean AND operator; IDS; classification algorithms; combinational feature selection approach; malicious network traffic detection; network intrusion detection system; ranking based feature selection techniques; Accuracy; Classification algorithms; Computational modeling; Feature extraction; Intrusion detection; Training; Vegetation; Boolean AND operator; Data Mining; Feature Selection Techniques; Garret´s Ranking Technique; Intrusion Detection System; NSL-KDD Dataset; WEKA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4799-7682-9
Type :
conf
DOI :
10.1109/PDGC.2014.7030720
Filename :
7030720
Link To Document :
بازگشت