Abstract
Intrusion detection is the ability to mitigate attacks and block new threats. In this paper, we deal with intrusion detection as a pattern classification problem where a connection is defined as a set of attributes. The latter forms a pattern that should be assigned to one of existing classes. The problem is to identify the given connection as a normal event or attack. We propose a stochastic local search method for feature selection where the aim is to select the set of significant attributes to be used in the classification task. The proposed approach is validated on the well-known NLS-KDD dataset and compared with some existing techniques. The results are interesting and show the efficiency of the proposed approach for intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abadeh, M.S., Habibi, J., Lucas, C.: Intrusion detection using a fuzzy genetics-based learning algorithm. J. Netw. Comput. Appl. 30(1), 414–428 (2007)
Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)
Ben Amor, N., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424 (2004)
Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES): A summary. SRI International, Computer Science Laboratory (1995)
Boughaci, D.: Metaheuristic approaches for the winner determination problem in combinatorial auction. In: Yang, X.S. (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics. SCI, vol. 427, pp. 775–791. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-29694-9_29
Boughaci, D., Kadi, M.D.E., Kada, M.: Fuzzy particle swarm optimization for intrusion detection. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012, Part V. LNCS, vol. 7667, pp. 541–548. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_64
Boughaci, D., Alkhawaldeh, A.A.: Three local search-based methods for feature selection in credit scoring. Vietnam J. Comput. Sci. 5(2), 107–121 (2018)
Boughaci, D., Ider, K., Yahiaoui, S.: Design and implementation of a misused intrusion detection system using autonomous and mobile agents. In: EATIS 2007, p. 12 (2007)
Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and Regression Trees. Wadsworth, Belmont (1984)
Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123–140 (1996)
Caruana, R., Freitag, D.: Greedy attribute selection. In: Proceedings of the Eleventh International Conference on Machine Learning (ICML 1994), New Brunswick, New Jersey, pp. 28–36. Morgan Kauffmann, San Francisco (1994)
Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240–250 (1992)
Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55, 119 (1997)
Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29, 131–163 (1997)
Kiennert, C., Ismail, Z., Debar, H., Leneutre, J.: A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Comput. Surv. 51(5), 90:1–90:31 (2019)
Hall, M.: Correlation-based feature selection for machine learning. In: Methodology, vol. 21i195-i20, pp. 1–5, April 1999
Hoos, H.H., Stutzle, T.: Stochastic Local Search: Foundations and Applications. Morgan Kaufmann Publishers, San Francisco (2004)
Ishibuchi, H., Murata, T.: Techniques and applications of genetic algorithms-based methods for designing compact fuzzy classification systems. Fuzzy Theory Syst. Tech. Appl. 3(40), 1081–1109 (1999)
Lee, S.C., Heinbuch, D.V.: Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 31(4), 294–299 (2001)
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. Defense Technical Information Center (2000)
Lunt, T.F., Jagannathan, R.: A prototype real-time intrusion-detection expert system. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 59–66 (1988)
Mehdi, M., Zair, S., Anou, A., Bensebti, M.: A Bayesian networks in intrusion detection systems. J. Comput. Sci. 3(5), 259–265 (2007)
Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001) (2001)
Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)
Quinlan, J.R.: Simplifying decision trees. Int. J. Man Mach. Stud. 27, 221–234 (1987)
Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo (1992)
Rennie, J., Shih, L., Teevan, J., Karger, D.: Tackling the poor assumptions of Naive Bayes classifiers. In: ICML (2003)
Salo, F., Injadat, M., Nassif, A.B., Shami, A., Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046–56058 (2018)
Vapnik, V.: Statistical Learning Theory. Wiley, New York (1998)
Waikato Environment for Knowledge Analysis (WEKA), Version 3.9. The University of Waikato, Hmilton, New Zealand. http://www.cs.waikato.ac.nz/. Accessed November 2018
Data set. http://iscx.ca/NSLKDD/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Boughaci, D. (2019). Stochastic Local Search Based Feature Selection for Intrusion Detection. In: Bramer, M., Petridis, M. (eds) Artificial Intelligence XXXVI. SGAI 2019. Lecture Notes in Computer Science(), vol 11927. Springer, Cham. https://doi.org/10.1007/978-3-030-34885-4_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-34885-4_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34884-7
Online ISBN: 978-3-030-34885-4
eBook Packages: Computer ScienceComputer Science (R0)