Skip to main content

Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection

  • Conference paper
  • First Online:
Artificial Intelligence Applications and Innovations (AIAI 2022)

Abstract

In daily live, online computer systems are becoming more pervasive and integrated. However, the access to the Internet can produce significant issues like cyber-attacks. The network intrusion detection system (NIDS) is a promising security solution that is used to detect attacks. It recently used Deep Learning in the detection process to obtain high performance. The performance of an NIDS depends on the used training dataset and the quality of features, where irrelevant features may decrease the detection performance, oppositely to relevant ones that are able to improve it. Feature selection is a good solution to select only relevant features to participate in the detection process. Chi-square is a supervised feature selection method that select only the most dependent features of the class feature. In this work, an Enhanced Chi-square (EChi2) method is proposed to select and weight features considering its degree of relevance. Experiments results, using the well-known NSLKDD dataset, shows that the proposed method outperforms the Chi-square.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kolias, C., Kambourakis, G., Maragoudakis, M.: Swarm intelligence in intrusion detection: a survey. J. Comput. Secur. 30(30), 625–642 (2011)

    Article  Google Scholar 

  2. Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. Concurr. Comput. Pract. Exp. 26(5), 1113–1129 (2014)

    Article  Google Scholar 

  3. Banerjee, M., Mitra, S., Banka, H.: Evolutionary rough feature selection in gene expression data. IEEE Trans. Syst. Man Cybern. 37(4), 622–632 (2007)

    Article  Google Scholar 

  4. Cheng, M.M., et al.: HFS: hierarchical feature selection for efficient image segmentation. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 867–882. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46487-9_53

    Chapter  Google Scholar 

  5. Middlemiss, M.J., Dick, G.: Weighted feature extraction using a genetic algorithm for intrusion detection. In: Congress on Evolutionary Computation, vol. 3, pp. 1669–1675 (2003)

    Google Scholar 

  6. Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., Yoo, P.D., Kim, K.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. In: IEEE Trans. Inf. Forens. Secur. 13(3), 621–636 (2017)

    Google Scholar 

  7. Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389–422 (2002)

    Article  Google Scholar 

  8. Ratanamahatana, C.A., Gunopulos, D.: Scaling up the Naive Bayesian classifier: using decision trees for feature selection (2002)

    Google Scholar 

  9. Nie, F., Yang, S., Zhang, R., Li, X.: A general framework for auto-weighted feature selection via global redundancy minimization. IEEE Trans. Image Process. 28(5), 2428–2438 (2018)

    Article  MathSciNet  Google Scholar 

  10. Balasaraswathi, V.R., Sugumaran, M., Hamid, Y.: Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Netw. 2(4), 107–119 (2017)

    Google Scholar 

  11. Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Elect. Eng. 40(1), 16–28 (2014)

    Article  Google Scholar 

  12. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (2018)

    Google Scholar 

  13. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence For Security and Defense Applications, pp. 1–6 (2009)

    Google Scholar 

  14. Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. App. 50, 102419 (2020)

    Google Scholar 

  15. Hindy, H., et al.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv preprint (2018)

    Google Scholar 

  16. Breiman, L., Friedman, J., Stone, C., Olshen, J., Richard, A.: Classification and Regression Trees. CRC Press, Boca Raton (1984)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Z. Sahraoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bennaceur, K., Sahraoui, Z., Nacer, M.A. (2022). Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection. In: Maglogiannis, I., Iliadis, L., Macintyre, J., Cortez, P. (eds) Artificial Intelligence Applications and Innovations. AIAI 2022. IFIP Advances in Information and Communication Technology, vol 646. Springer, Cham. https://doi.org/10.1007/978-3-031-08333-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08333-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08332-7

  • Online ISBN: 978-3-031-08333-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics