Improving Intrusion Detection System Using a New Feature Selection Technique

Document Type : Original Article

Authors

-

Abstract

Intrusion detection is an important subject of research in the cyberspace field. In an Intrusion            DetectionSystem (IDS), redundant and irrelevant features have a negative impact on the IDS performance. Therefore, an appropriate feature selection method is an important part of IDSs for eliminating unrelated and redundant features. In this paper, a new feature selection method is proposed that joins features level to level and step by step to select a subset of proper features in order to finally detect intrusion more            accurately and speedily. The purpose of the proposed method is applying it in intrusion detection systems to distinguish a normal the connection from an intruding connection to the network. The experiments on the NSL-KDD dataset show that the proposed method in comparison with other methods selects only six       important features among the 41 features in the baseline, and can detect an intrusion with precision above 99.58% by relying only on these six features. In other words, the proposed method's failure has been 42 in 10,000 connections of the network and has correctly identified other 9958 regular connections and labeled them as normal. Finally, improvement in the algorithm runtime and the percentage accuracy of the        proposed method in comparison with other methods has been verified and reported.
 

Keywords


 [1] O. Joldzic, Z. Djuric, and P. Vuletic, “A transparent and scalable anomaly-based DoS detection method,” Computer Networks, vol. 104, pp. 27-42, 2016.##
[2] M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.##
[3] T. F. Ghanem, W. S. Elkilani, and H. M. Abdul-Kader, “A hybrid approach for efficient anomaly detection using metaheuristic methods,” Journal of advanced research, vol. 6, no. 4, pp. 609-619, 2015.##
[4] C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing,” Procedia Technology, vol. 6, pp. 905-912, 2012.##
[5] K. Shafi and H. A. Abbass, “An adaptive genetic-based signature learning system for intrusion detection,” Expert Systems with Applications, vol. 36, no. 10, pp.        12036-12043, 2009.##
[6] Y. Li, J. Xia, S. Zhang, J. Yan,  X. Ai, and K. Dai, “An efficient intrusion detection system based on support vector machines and gradually feature removal method,” Expert Systems with Applications, vol. 39, no. 1, pp.    424-430, 2012.##
[7] U. Stanczyk, “RELIEF-based selection of decision rules,” Procedia Computer Science, vol. 35, pp. 299-308, 2014.##
[8] P. Bermejo, L. de la Ossa, J. A. Gámez, and J. M. Puerta, “Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking,” Knowledge-Based Systems, vol. 25, no. 1, pp. 35-44, 2012.##
[9] P. Bermejo, J. A. Gámez, and J. M. Puerta, “Speeding up incremental wrapper feature subset selection with Naive Bayes classifier,” Knowledge-Based Systems, vol. 55, pp. 140-147, 2014.##
[10] T. A. Feo and M. G. Resende, “A probabilistic heuristic for a computationally difficult set covering problem,” Operations research letters, vol. 8, no. 2, pp.                  67-71, 1989.##
 [11] X. Chen, Y. Ye, X. Xu, and J. Z. Huang, “A feature group weighting method for subspace clustering of               high-dimensional data Pattern Recognition,” vol. 45, no. 1, pp. 434-446, 2012.##
[12] P. Bermejo, J. A. Gámez, and J. M.  Puerta, “A GRASP algorithm for fast hybrid (filter-wrapper) feature subset selection in high-dimensional datasets,” Pattern Recognition Letters, vol. 32, no. 5, pp. 701-711, 2011.##
[13] P. Festa and M. G. Resende, “An annotated bibliography of GRASP–Part I: Algorithms,” International Transactions in Operational Research, vol. 16, no. 1, pp. 1-24, 2009.##
[14] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, IEEE Symposium on, pp. 1-6, July 2009.##