IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 6, June 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Performance Analysis Of Different Feature Selection Methods In Intrusion Detection

[Full Text]

 

AUTHOR(S)

Megha Aggarwal, Amrita

 

KEYWORDS

Index Terms: Intrusion Detection, Comparative Analysis, KDDCup99 dataset, Feature Selection

 

ABSTRACT

Abstract: In today’s era detection of security threats that are commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Highly confidential data of various organizations are present over the network so in order to preserve that data from unauthorized users or attackers a strong security framework is required. Intrusion detection system plays a major role in providing security to computer networks. An Intrusion detection system collects and analyzes information from different areas within a computer or a network to identify possible security threats that include threats from both outside as well as inside the organization. The Intrusion detection system deals with large amount of data whichcontains various irrelevant and redundant features resulting in increased processing time and low detection rate. Therefore feature selection plays an important role in intrusion detection. There arevarious feature selection methods proposed in literature by different authors. In this paper a comparative analysis of different feature selection methods are presented on KDDCUP’99 benchmark dataset and their performance are evaluated in terms of detection rate, root mean square error and computational time.

 

REFERENCES

[1]. Anderson, James P., “Computer Security Threat Monitoring and Surveillance”, James P. Anderson Co., Fort Washington, Pa., 1980.

[2]. Denning, D. E. (1987), “An intrusion detection model. IEEE Transaction on SoftwareEngineering”, Software Engineering 13(2), 222-232.

[3]. Denning, D. E. (1987). An intrusion detection model. IEEE Transaction on Software Engineering, Software Engineering 13(2), 222-232.

[4]. Wu, S.X. &Banzhaf, W. (2010). The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing Journal, 10, 1–35.

[5]. Lazarevic, A., Ertoz, L., Kumar V., Ozgur A. &Srivastava J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. In Proc. of the SIAM Conference on Data Mining.

[6]. Kumar, S. &Spafford, E. H. (1994). A pattern matching model for misuse intrusion detection.In Proceedings of the 17th National Computer Security Conference, 11-21.

[7]. sKDD Cup 1999 Intrusion detection dataset: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

[8]. Mukkamala, S. et al. (2005). Intrusion detection using an ensemble of intelligent paradigms.Journal of Network and Computer Applications, 28(2), 167–82.

[9]. Lewis, P. M. (1962). The characteristic selection problem in recognition system. IRE Transaction on Information Theory, 8, 171-178.

[10]. John, G.H. et al. (1994). Irrelevant Features and the Subset Selection Problem. Proc. of the 11thInt. Conf. on Machine Learning, Morgan Kaufmann Publishers, 121-129

[11]. Dash, M. & Liu, H. (1997). Feature Selection for Classification. Intelligent Data Analysis, 1(3), 131–56
[12]. Blum, Avrim L. & Pat Langley (1997). Selection of relevant features and examples in machinelearning. Artificial Intelligence, 97(1-2), 245–271

[13]. Liu, H. & Yu, L. (2005).Towards integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering, 17(4), 491-502

[14]. Das, S. (2001). Filters, Wrappers and a Boosting-Based Hybrid for Feature Selection. Proc. 18thInt’l Conf. Machine Learning, 74-81

[15]. Liu, H. & Yu, L. (2005). Towards integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering, 17(4), 491-502

[16]. R. Kohavi and G.H. John (1997).Wrappers for Feature Subset Selection.Artificial Intelligence.97 (1-2), 273-324

[17]. Xing, E. et al. (2001). Feature Selection for High-Dimensional Genomic Microarray Data. Proc. 15th Int’l Conf.Machine Learning, 601-608

[18]. Gong, S. (2011),” Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction”, International Conference on Multimedia Technology (ICMT), 6365 – 6368.

[19]. Nyguen, H. and Franke, K. et al.(2010)”Improving effectiveness of intrusion detection by correlation feature selection”, International conference on availability, reliability and security, 17-24.

[20]. Xing, E. et al. (2001)”Feature Selection for High-Dimensional Genomic Microarray Data”, Proc.15th Int’l Conf.Machine Learning, 601-608.

[21]. Sridevi,R. and Chattemvelli ,R.(2012) “Genetic algorithm and Artificial immune systems: A combinational approach for network intrusion detection ”,International conference on advances in engineering, science and management (ICAESM-2012),494-498.

[22]. http://weka.sourceforge.net/doc.dev/weka/attributeSelection.