Skip to main content

Using Attack-Specific Feature Subsets for Network Intrusion Detection

  • Conference paper
AI 2006: Advances in Artificial Intelligence (AI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4304))

Included in the following conference series:

Abstract

One of the essential tasks for building a network intrusion detection system might be to differentiate a salient feature subset from noisy and/or redundant features. Especially, in real-time environment too many features to be monitored deteriorate the system performance. In this paper, we focus on extracting robust feature subsets that maximizes inter-classes seperability with minimized subset size based on a genetic algorithm-based optimization, reducing both false positive and false negative errors by learning class-specific feature subsets. Experimental results show that the proposed approach is especially effective in detecting totally unknown attack patterns compared with single feature-subset model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chebrolu, S., Abraham, A., Thomas, J.: Feature deduction and ensemble design of intrusion detection systems. Computers & Security 24, 295–307 (2005)

    Article  Google Scholar 

  2. Fayyad, U.M., Irani, K.B.: Multi-interval discretization of continuous-valued attributes for classification learning. In: Proc. of 13th International Joint Conf. on Artificial Intelligence, pp. 1022–1027 (1993)

    Google Scholar 

  3. Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795–1803 (2003)

    Article  Google Scholar 

  4. Han, S.J., Cho, S.-B.: Detecting intrusion with rule-based integration of multiple models. Computers & Security 22, 613–623 (2003)

    Article  Google Scholar 

  5. Hansman, S., Hunt, R.: A Taxonomy of network and computer attacks. Computers & Security 24, 31–43 (2005)

    Article  Google Scholar 

  6. Kim, S.H., Shin, S.W.: Identifying the impact of decision variables for nonlinear classification. Expert Systems With Applications 18, 201–214 (2000)

    Article  Google Scholar 

  7. Langley, P., Sage, S.: Induction of Selective Bayesian classifiers. In: Proc. of the 10th Conference on Uncertainty in Artificial Intelligence, pp. 399–406 (1994)

    Google Scholar 

  8. Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220–237. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Information System Security 3(4), 262–294 (2000)

    Article  Google Scholar 

  10. Mukkamala, S., Sunga, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28, 167–182 (2005)

    Article  Google Scholar 

  11. Punch, W.F., Goodman, E.D., et al.: Further research on feature selection and classification using genetic algorithms. In: Int. Conf. on Genetic Algorithms, pp. 557–564 (1993)

    Google Scholar 

  12. Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based Modeling for Fraud and Intrusion Dectection: Results from the JAM Project. In: DARPA Information Survivability Conference (2000)

    Google Scholar 

  13. Stolfo, S., Lee, W., Chan, P.K., Fan, W., Eskin, E.: Data mining-based intrusion detectors: An overview of the Columbia IDS project. ACM SIGMOD Record 30(4), 5–14 (2001)

    Article  Google Scholar 

  14. Zhang, C., Jiang, J., Kamel, M.: A Intrusion detection using hierarchical neural networks. Pattern Recognition Letters, 779–791 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shin, S.W., Lee, C.H. (2006). Using Attack-Specific Feature Subsets for Network Intrusion Detection. In: Sattar, A., Kang, Bh. (eds) AI 2006: Advances in Artificial Intelligence. AI 2006. Lecture Notes in Computer Science(), vol 4304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11941439_34

Download citation

  • DOI: https://doi.org/10.1007/11941439_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49787-5

  • Online ISBN: 978-3-540-49788-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics