Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection

نویسندگان

  • Anazida Zainal
  • Mohd Aizaini Maarof
  • Siti Mariyam Hj. Shamsuddin
چکیده

Most of the existing IDS use all the features in network packet to evaluate and look for known intrusion patterns. This data contains irrelevant and redundant features. Unfortunately, the drawback to this approach is a lengthy detection process. In real-time environment this may degrade the performance of an IDS. Thus, feature selection is required to address this issue. In this paper, we use wrapper approach where we integrate Rough Set and Particle Swarm to form a 2-tier structure of feature selection. Experimental results show that feature subset proposed by Rough-PSO gives better representation of data and they are robust.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

Hierarchical Feature Selection in IDS

Generally, IDS use all the features in network packet to evaluate and look for intrusive patterns. This data contains redundant and some give false correlation. Thus, feature selection is required to address this issue. This study integrates a statistical approach called Rough Set and evolutionary computing approach called Particle Swarm to form a 2-tier structure of feature selection process. ...

متن کامل

Network Anomaly Detection using Soft Computing

One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature selection heuristics and using rough fuzzy for clustering data. ICA is to separate these independent components (ICs) from the monitored variables. Rou...

متن کامل

Anomaly Detection using Feature Selection and SVM Kernel Trick

Analysis of system security becomes a major task for researchers. Intrusion detection plays a vital role in the security domain in these days, Internet usage has been increased enormously and with this, the threat to system resources has also increased. Anomaly based intrusion changes its behaviour dynamically, to detect these types of intrusions need to adopt the novel approaches are required....

متن کامل

Anomaly Detection in Wireless Lan Using Rough Set Theory Combined Classifier Model

In this paper, we suggest to exploit the framework for detecting anomalies in Wireless Local Area Networks (WLAN) using Rough Set Theory (RST). With the expansion of wireless network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007