Abstract
One of the essential tasks for building a network intrusion detection system might be to differentiate a salient feature subset from noisy and/or redundant features. Especially, in real-time environment too many features to be monitored deteriorate the system performance. In this paper, we focus on extracting robust feature subsets that maximizes inter-classes seperability with minimized subset size based on a genetic algorithm-based optimization, reducing both false positive and false negative errors by learning class-specific feature subsets. Experimental results show that the proposed approach is especially effective in detecting totally unknown attack patterns compared with single feature-subset model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chebrolu, S., Abraham, A., Thomas, J.: Feature deduction and ensemble design of intrusion detection systems. Computers & Security 24, 295–307 (2005)
Fayyad, U.M., Irani, K.B.: Multi-interval discretization of continuous-valued attributes for classification learning. In: Proc. of 13th International Joint Conf. on Artificial Intelligence, pp. 1022–1027 (1993)
Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795–1803 (2003)
Han, S.J., Cho, S.-B.: Detecting intrusion with rule-based integration of multiple models. Computers & Security 22, 613–623 (2003)
Hansman, S., Hunt, R.: A Taxonomy of network and computer attacks. Computers & Security 24, 31–43 (2005)
Kim, S.H., Shin, S.W.: Identifying the impact of decision variables for nonlinear classification. Expert Systems With Applications 18, 201–214 (2000)
Langley, P., Sage, S.: Induction of Selective Bayesian classifiers. In: Proc. of the 10th Conference on Uncertainty in Artificial Intelligence, pp. 399–406 (1994)
Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220–237. Springer, Heidelberg (2003)
McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Information System Security 3(4), 262–294 (2000)
Mukkamala, S., Sunga, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28, 167–182 (2005)
Punch, W.F., Goodman, E.D., et al.: Further research on feature selection and classification using genetic algorithms. In: Int. Conf. on Genetic Algorithms, pp. 557–564 (1993)
Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based Modeling for Fraud and Intrusion Dectection: Results from the JAM Project. In: DARPA Information Survivability Conference (2000)
Stolfo, S., Lee, W., Chan, P.K., Fan, W., Eskin, E.: Data mining-based intrusion detectors: An overview of the Columbia IDS project. ACM SIGMOD Record 30(4), 5–14 (2001)
Zhang, C., Jiang, J., Kamel, M.: A Intrusion detection using hierarchical neural networks. Pattern Recognition Letters, 779–791 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shin, S.W., Lee, C.H. (2006). Using Attack-Specific Feature Subsets for Network Intrusion Detection. In: Sattar, A., Kang, Bh. (eds) AI 2006: Advances in Artificial Intelligence. AI 2006. Lecture Notes in Computer Science(), vol 4304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11941439_34
Download citation
DOI: https://doi.org/10.1007/11941439_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49787-5
Online ISBN: 978-3-540-49788-2
eBook Packages: Computer ScienceComputer Science (R0)