Skip to main content

Recursive Feature Selection and Intrusion Classification in NSL-KDD Dataset Using Multiple Machine Learning Methods

  • Conference paper
  • First Online:
Computing, Communication and Learning (CoCoLe 2023)

Abstract

IDS are critical components of modern computer networks, designed to detect and alert administrators of malicious activity. In order to detect network irregularities and keep data secure, it is critical to build an effective IDS that prevents unauthorized access to network resources. In this study, several machine learning classifiers were used to detect attacks in the NSL-KDD dataset. These classifiers included SVM, Naive Bayes, Random Forest, Decision Tree, and XGBoost. We have chosen 13 feature subsets using the recursive feature selection technique from the NSL-KDD dataset and used them to assess the model’s performance. Because the dimension of the data influences how well this IDS performs, the data was pre-processed, and superfluous attributes were deleted. The experimental results demonstrate that for all attack classes utilizing distinctive feature subsets, the accuracy of Decision Tree (DT), Nave Bayes (NB), Random Forest (RF), Linear Regression, XGBoost, AdaBoost, and Support Vector Machine (SVM) was over 95%. Overall, the performance of XGBoost in conjunction with recursive feature selection was the best.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agarwal, M.: Detecting flooding, impersonation and injection attacks on AWID dataset using ml based methods. In: 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), pp. 221–226. IEEE (2022)

    Google Scholar 

  2. Agarwal, M., Biswas, S., Nandi, S.: Detection of de-authentication dos attacks in Wi-Fi networks: a machine learning approach. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 246–251 (2015). https://doi.org/10.1109/SMC.2015.55

  3. Agarwal, M., Pasumarthi, D., Biswas, S., Nandi, S.: Machine learning approach for detection of flooding dos attacks in 802.11 networks and attacker localization. Int. J. Mach. Learn. Cybern. 7, 1035–1051 (2016)

    Google Scholar 

  4. Agarwal, M., Purwar, S., Biswas, S., Nandi, S.: Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system. IEEE/CAA J. Autom. Sinica 4(4), 792–808 (2016)

    Google Scholar 

  5. Agarwal, M., Purwar, S., Biswas, S., Nandi, S.: Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system. IEEE/CAA J. Autom. Sinica 4(4), 792–808 (2017). https://doi.org/10.1109/JAS.2016.7510178

  6. Aghdam, M.H., Kabiri, P., et al.: Feature selection for intrusion detection system using ant colony optimization. Int. J. Netw. Secur. 18(3), 420–432 (2016)

    Google Scholar 

  7. Ahmad, T., Aziz, M.N.: Data preprocessing and feature selection for machine learning intrusion detection systems. ICIC Express Lett. 13(2), 93–101 (2019)

    Google Scholar 

  8. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)

    Article  MathSciNet  Google Scholar 

  9. Benaddi, H., Ibrahimi, K., Benslimane, A.: Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN. In: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–6. IEEE (2018)

    Google Scholar 

  10. Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Security 11(3), 8–14 (2019)

    Google Scholar 

  11. Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464–32476 (2020)

    Article  Google Scholar 

  12. Liu, Z., et al.: A method of SVM with normalization in intrusion detection. Procedia Environ. Sci. 11, 256–262 (2011)

    Article  Google Scholar 

  13. Mohammed, B., Gbashi, E.K.: Intrusion detection system for NSL-KDD dataset based on deep learning and recursive feature elimination. Eng. Technol. J. 39(7), 1069–1079 (2021)

    Article  Google Scholar 

  14. Ravipati, R.D., Abualkibash, M.: Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper. Int. J. Comput. Sci. Inf. Technol. (IJCSIT), 11 (2019)

    Google Scholar 

  15. Sapre, S., Ahmadi, P., Islam, K.: A robust comparison of the KDDCup99 and NSL-KDD IoT network intrusion detection datasets through various machine learning algorithms. arXiv preprint arXiv:1912.13204 (2019)

  16. Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575–29585 (2020)

    Article  Google Scholar 

  17. Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayank Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohanty, S., Agarwal, M. (2024). Recursive Feature Selection and Intrusion Classification in NSL-KDD Dataset Using Multiple Machine Learning Methods. In: Panda, S.K., Rout, R.R., Bisi, M., Sadam, R.C., Li, KC., Piuri, V. (eds) Computing, Communication and Learning. CoCoLe 2023. Communications in Computer and Information Science, vol 1892. Springer, Cham. https://doi.org/10.1007/978-3-031-56998-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56998-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56997-5

  • Online ISBN: 978-3-031-56998-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics