Feature Selection for Intrusion Detection using NSL-KDD
نویسندگان
چکیده
These days, network traffic is increasing due to the increasing use of smart devices and the Internet. Amount of the intrusion detection studies focused on feature selection or reduction because some of the features are irrelevant and redundant which results lengthy detection process and degrades the performance of an intrusion detection system (IDS). The purpose of this study is to identify important selected input features in building IDS that is computationally efficient and effective. For this we evaluate the performance of standard feature selection methods; CFS(Correlation-based Feature Selection), IG(Information Gain) and GR(Gain Ratio). In this paper, we propose a new feature selection method using feature average of total and each classes. We apply one of the efficient classifier decision tree algorithm for evaluating feature reduction method. We compare between proposed method and other methods. Key-Words: Data Mining, Preprocessing, Feature selection, Feature Reduction, Intrusion detection system, NSL-KDD
منابع مشابه
A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملFeature Selection and Classification of Intrusion Detection System Using Rough Set
With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper we propose an intrusion detection system that uses rough set theory for feature selection, which is extraction of relevan...
متن کاملAn intrusion detection system using network traffic profiling and online sequential extreme learning machine
Anomaly based Intrusion Detection Systems (IDS) learn normal and anomalous behavior by analyzing network traffic in various benchmark datasets. Common challenges for IDSs are large amounts of data to process, low detection rates and high rates of false alarms. In this paper, a technique based on the Online Sequential Extreme Learning Machine (OS-ELM) is presented for intrusion detection. The pr...
متن کاملA Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection
In this paper, we present a two-stage classifier based on RepTree algorithm and protocols subset for network intrusion detection system. To evaluate the performance of our approach, we used the UNSW-NB15 data set and the NSL-KDD data set. In first phase our approach divides the incoming network traffics into three type of protocols TCP, UDP or Other, then classifies into normal or anomaly. In s...
متن کامل