Skip to main content

Stochastic Local Search Based Feature Selection for Intrusion Detection

  • Conference paper
  • First Online:
Artificial Intelligence XXXVI (SGAI 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11927))

Abstract

Intrusion detection is the ability to mitigate attacks and block new threats. In this paper, we deal with intrusion detection as a pattern classification problem where a connection is defined as a set of attributes. The latter forms a pattern that should be assigned to one of existing classes. The problem is to identify the given connection as a normal event or attack. We propose a stochastic local search method for feature selection where the aim is to select the set of significant attributes to be used in the classification task. The proposed approach is validated on the well-known NLS-KDD dataset and compared with some existing techniques. The results are interesting and show the efficiency of the proposed approach for intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abadeh, M.S., Habibi, J., Lucas, C.: Intrusion detection using a fuzzy genetics-based learning algorithm. J. Netw. Comput. Appl. 30(1), 414–428 (2007)

    Article  Google Scholar 

  2. Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)

    Google Scholar 

  3. Ben Amor, N., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424 (2004)

    Google Scholar 

  4. Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES): A summary. SRI International, Computer Science Laboratory (1995)

    Google Scholar 

  5. Boughaci, D.: Metaheuristic approaches for the winner determination problem in combinatorial auction. In: Yang, X.S. (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics. SCI, vol. 427, pp. 775–791. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-29694-9_29

    Chapter  Google Scholar 

  6. Boughaci, D., Kadi, M.D.E., Kada, M.: Fuzzy particle swarm optimization for intrusion detection. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012, Part V. LNCS, vol. 7667, pp. 541–548. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_64

    Chapter  Google Scholar 

  7. Boughaci, D., Alkhawaldeh, A.A.: Three local search-based methods for feature selection in credit scoring. Vietnam J. Comput. Sci. 5(2), 107–121 (2018)

    Article  Google Scholar 

  8. Boughaci, D., Ider, K., Yahiaoui, S.: Design and implementation of a misused intrusion detection system using autonomous and mobile agents. In: EATIS 2007, p. 12 (2007)

    Google Scholar 

  9. Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and Regression Trees. Wadsworth, Belmont (1984)

    MATH  Google Scholar 

  10. Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123–140 (1996)

    MATH  Google Scholar 

  11. Caruana, R., Freitag, D.: Greedy attribute selection. In: Proceedings of the Eleventh International Conference on Machine Learning (ICML 1994), New Brunswick, New Jersey, pp. 28–36. Morgan Kauffmann, San Francisco (1994)

    Google Scholar 

  12. Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240–250 (1992)

    Google Scholar 

  13. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55, 119 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  14. Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29, 131–163 (1997)

    Article  MATH  Google Scholar 

  15. Kiennert, C., Ismail, Z., Debar, H., Leneutre, J.: A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Comput. Surv. 51(5), 90:1–90:31 (2019)

    Article  Google Scholar 

  16. Hall, M.: Correlation-based feature selection for machine learning. In: Methodology, vol. 21i195-i20, pp. 1–5, April 1999

    Google Scholar 

  17. Hoos, H.H., Stutzle, T.: Stochastic Local Search: Foundations and Applications. Morgan Kaufmann Publishers, San Francisco (2004)

    MATH  Google Scholar 

  18. Ishibuchi, H., Murata, T.: Techniques and applications of genetic algorithms-based methods for designing compact fuzzy classification systems. Fuzzy Theory Syst. Tech. Appl. 3(40), 1081–1109 (1999)

    Article  Google Scholar 

  19. Lee, S.C., Heinbuch, D.V.: Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 31(4), 294–299 (2001)

    Article  Google Scholar 

  20. Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. Defense Technical Information Center (2000)

    Google Scholar 

  21. Lunt, T.F., Jagannathan, R.: A prototype real-time intrusion-detection expert system. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 59–66 (1988)

    Google Scholar 

  22. Mehdi, M., Zair, S., Anou, A., Bensebti, M.: A Bayesian networks in intrusion detection systems. J. Comput. Sci. 3(5), 259–265 (2007)

    Article  Google Scholar 

  23. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001) (2001)

    Google Scholar 

  24. Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)

    MathSciNet  Google Scholar 

  25. Quinlan, J.R.: Simplifying decision trees. Int. J. Man Mach. Stud. 27, 221–234 (1987)

    Article  Google Scholar 

  26. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo (1992)

    Google Scholar 

  27. Rennie, J., Shih, L., Teevan, J., Karger, D.: Tackling the poor assumptions of Naive Bayes classifiers. In: ICML (2003)

    Google Scholar 

  28. Salo, F., Injadat, M., Nassif, A.B., Shami, A., Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046–56058 (2018)

    Article  Google Scholar 

  29. Vapnik, V.: Statistical Learning Theory. Wiley, New York (1998)

    MATH  Google Scholar 

  30. Waikato Environment for Knowledge Analysis (WEKA), Version 3.9. The University of Waikato, Hmilton, New Zealand. http://www.cs.waikato.ac.nz/. Accessed November 2018

  31. Data set. http://iscx.ca/NSLKDD/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalila Boughaci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boughaci, D. (2019). Stochastic Local Search Based Feature Selection for Intrusion Detection. In: Bramer, M., Petridis, M. (eds) Artificial Intelligence XXXVI. SGAI 2019. Lecture Notes in Computer Science(), vol 11927. Springer, Cham. https://doi.org/10.1007/978-3-030-34885-4_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34885-4_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34884-7

  • Online ISBN: 978-3-030-34885-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics