Abstract
In daily live, online computer systems are becoming more pervasive and integrated. However, the access to the Internet can produce significant issues like cyber-attacks. The network intrusion detection system (NIDS) is a promising security solution that is used to detect attacks. It recently used Deep Learning in the detection process to obtain high performance. The performance of an NIDS depends on the used training dataset and the quality of features, where irrelevant features may decrease the detection performance, oppositely to relevant ones that are able to improve it. Feature selection is a good solution to select only relevant features to participate in the detection process. Chi-square is a supervised feature selection method that select only the most dependent features of the class feature. In this work, an Enhanced Chi-square (EChi2) method is proposed to select and weight features considering its degree of relevance. Experiments results, using the well-known NSLKDD dataset, shows that the proposed method outperforms the Chi-square.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kolias, C., Kambourakis, G., Maragoudakis, M.: Swarm intelligence in intrusion detection: a survey. J. Comput. Secur. 30(30), 625–642 (2011)
Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. Concurr. Comput. Pract. Exp. 26(5), 1113–1129 (2014)
Banerjee, M., Mitra, S., Banka, H.: Evolutionary rough feature selection in gene expression data. IEEE Trans. Syst. Man Cybern. 37(4), 622–632 (2007)
Cheng, M.M., et al.: HFS: hierarchical feature selection for efficient image segmentation. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 867–882. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46487-9_53
Middlemiss, M.J., Dick, G.: Weighted feature extraction using a genetic algorithm for intrusion detection. In: Congress on Evolutionary Computation, vol. 3, pp. 1669–1675 (2003)
Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., Yoo, P.D., Kim, K.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. In: IEEE Trans. Inf. Forens. Secur. 13(3), 621–636 (2017)
Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389–422 (2002)
Ratanamahatana, C.A., Gunopulos, D.: Scaling up the Naive Bayesian classifier: using decision trees for feature selection (2002)
Nie, F., Yang, S., Zhang, R., Li, X.: A general framework for auto-weighted feature selection via global redundancy minimization. IEEE Trans. Image Process. 28(5), 2428–2438 (2018)
Balasaraswathi, V.R., Sugumaran, M., Hamid, Y.: Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Netw. 2(4), 107–119 (2017)
Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Elect. Eng. 40(1), 16–28 (2014)
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (2018)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence For Security and Defense Applications, pp. 1–6 (2009)
Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. App. 50, 102419 (2020)
Hindy, H., et al.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv preprint (2018)
Breiman, L., Friedman, J., Stone, C., Olshen, J., Richard, A.: Classification and Regression Trees. CRC Press, Boca Raton (1984)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bennaceur, K., Sahraoui, Z., Nacer, M.A. (2022). Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection. In: Maglogiannis, I., Iliadis, L., Macintyre, J., Cortez, P. (eds) Artificial Intelligence Applications and Innovations. AIAI 2022. IFIP Advances in Information and Communication Technology, vol 646. Springer, Cham. https://doi.org/10.1007/978-3-031-08333-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-08333-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08332-7
Online ISBN: 978-3-031-08333-4
eBook Packages: Computer ScienceComputer Science (R0)