Skip to main content

Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4705))

Included in the following conference series:

Abstract

Most of the existing IDS use all the features in network packet to evaluate and look for known intrusive patterns. Some of these features are irrelevant and redundant. The drawback to this approach is a lengthy detection process. In real-time environment this may degrade the performance of an IDS. Thus, feature selection is required to address this issue. In this paper, we use wrapper approach where we integrate Rough Set and Particle Swarm to form a 2-tier structure of feature selection process. Experimental results show that feature subset proposed by Rough-DPSO gives better representation of data and they are robust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: SAINT’03. Proceedings of the 2003 Symposium on Applications and the Internet, pp. 209–216 (2003)

    Google Scholar 

  2. Li, J., Zhang, G.Y, Gu, G.C.: The Research and Implementation of Intelligent Intrusion Detection System Based on Artificial Neural Network. In: IEEE Proceedings of the 3rd. International Conference on Machine Learning and Cybernetics, pp. 3178–3182. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  3. Zhang, C., Jiang, J., Kamel, M.: Intrusion Detection using Hierarchical Neural Networks. Pattern Recognition Letters 26, 779–791 (2005)

    Article  Google Scholar 

  4. Xu, X., Wang, X.: An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. In: Li, X., Wang, S., Dong, Z.Y. (eds.) ADMA 2005. LNCS (LNAI), vol. 3584, pp. 696–703. Springer, Heidelberg (2005)

    Google Scholar 

  5. Gao, H., Yang, H., Wang, X.: Kernel PCA Based Network Intrusion Feature Extraction and Detection Using SVM. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3611, pp. 89–94. Springer, Heidelberg (2005)

    Google Scholar 

  6. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. Journal of Computers and Security 24(4), 295–307 (2005)

    Article  Google Scholar 

  7. Chen, Y., Abraham, A., Yang, J.: Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3498, pp. 439–444. Springer, Heidelberg (2005)

    Google Scholar 

  8. Chen, Y., Abraham, A., Yang, J.: Feature Selection and Classification Using Hybrid Flexible Neural Tree. Journal of Neurocomputing 7, 305–313 (2006)

    Article  Google Scholar 

  9. Shi, Y.: Particle Swarm Optimization. Feature Article, IEEE Neural Networks Society, 8–12 (2004)

    Google Scholar 

  10. Wang, K., Huang, L., Zhou, C., Pang, W.: Particle Swarm Optimization for Traveling Salesman Problem. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi’an (November 2-5, 2003)

    Google Scholar 

  11. Kennedy, J., Spears, W.M.: Matching Algorithms to Problems: An Experimental Test of the Particle Swarm and Some Genetic Algorithms on the Multimodal Problem Generator. In: Proceedings of International Conference on Evolutionary Computation, pp. 78–83 (1998)

    Google Scholar 

  12. Jensen, R., Shen, Q.: Finding rough set Reducts with Ant Colony Optimization. In: Proceedings 2003 UK Workshop on Computational Intelligence (2003)

    Google Scholar 

  13. Pawlak, Z.: Rough Sets, Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Boston, MA (1991)

    MATH  Google Scholar 

  14. Jensen, R., Shen, Q.: Fuzzy-rough Data Reduction with Ant Colony Optimization. Journal of Fussy Sets and Systems 149, 5–20 (2005)

    Article  MATH  Google Scholar 

  15. Monteiro, S., Uto, T.K., Kosugi, Y., Kobayashi, N., Watanabe, E., Kameyama, K.: Feature Extraction of Hyperspectral Data for Under Spilled Blood Visualization Using Particle Swarm Optimization. International Journal of Bioelectromagnetism 7(1), 232–235 (2005)

    Google Scholar 

  16. Sung, A.H., Mukkamala, S.: The Feature Selection and Intrusion Detection Problems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 468–482. Springer, Heidelberg (2004)

    Google Scholar 

  17. Swiniarski, R.W., Skowron, A.: Rough set Methods in Feature Selection and Recognition. Pattern Recognition Letters 24, 833–849 (2003)

    Article  MATH  Google Scholar 

  18. Chakraborty, B.: Feature Subset Selection by Neuro-rough Hybridization. LNCS, pp. 519–526. Springer, Heidelberg (2005)

    Google Scholar 

  19. Hassan, A., Nabi Baksh, M.S., Shaharoun, A.M., And Jamaluddin, H.: Improved SPC Chart Pattern Recognition Using Statistical Feature. International Journal of Production Research 41(7), 1587–1603 (2003)

    Article  Google Scholar 

  20. Zhang, L.H., Zhang, G.H., Yu, L., Zhang, J., Bai, Y.C.: Intrusion Detection Using Rough Set Classification. Journal of Zheijiang University Science 5(9), 1076–1086 (2004)

    Article  Google Scholar 

  21. Sung, W.S., Chi, H.L.: Using Attack-Specific Feature Subsets for Network Intrusion Detcetion. In: Sattar, A., Kang, B.-H. (eds.) AI 2006. LNCS (LNAI), vol. 4304, pp. 305–311. Springer, Heidelberg (2006)

    Google Scholar 

  22. Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R.: Feature Selection based on Rough Sets and Particle Swarm Optimization. Pattern Recognition Letters 28(4), 459–471 (2007)

    Article  Google Scholar 

  23. Liu, Y., Qin, Z., Xu, Z., He, X.: Feature Selection with Particle Swarms. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3331, pp. 425–430. Springer, Heidelberg (2004)

    Google Scholar 

  24. Wang, L., Yu, J.: Fault Feature Selection Based on Modified Binary PSO with Mutation and Its Application in Chemical Process Fault Diagnosis. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 832–840. Springer, Heidelberg (2005)

    Google Scholar 

  25. Kennedy, J., Eberhart, R.: Swarm Intelligence. Morgan Kaufmann Publishers, San Francisco, United States (2001)

    Google Scholar 

  26. Mukkamala, S., Hung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28, 167–182 (2005)

    Article  Google Scholar 

  27. Mukkamala, S., Sung, A.H.: Feature ranking and Selection for Intrusion detection Systems. In: Proceedings of International Conference on Information and Knowledge Engineering, Las Vegas, USA (2002)

    Google Scholar 

  28. Lee, H., Song, J., Park, D.: Intrusion Detection System based on Multiclass SVM. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds.) RSFDGrC 2005. LNCS (LNAI), vol. 3642, pp. 511–519. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  29. Xu, X., Wang, X.: An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. In: Li, X., Wang, S., Dong, Z.Y. (eds.) ADMA 2005. LNCS (LNAI), vol. 3584, pp. 696–703. Springer, Heidelberg (2005)

    Google Scholar 

  30. Burges, C.: A tutorial on Support Vector Machines for Pattern Recognition. Journal of Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  31. Chen, W.H., Hsu, S.H., Shen, H.P.: Application of SVM and ANN for Intrusion Detection. Journal of Computers & Operations Research 32, 2617–2634 (2005)

    Article  MATH  Google Scholar 

  32. Chih, C., Chih, J.: LIBSVM : A library for support vector machines. Tutorial and software (2001), available at http://www.csie.ntu.edu.tw/~cjlin/libsvm

  33. Øhrn, A.: Technical Reference Manual, Department of Computer and Information Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway, pp. 1–66 (2000), http://rosetta.lcb.uu.se/general/resources/manual.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zainal, A., Maarof, M.A., Shamsuddin, S.M. (2007). Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74472-6_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74472-6_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74468-9

  • Online ISBN: 978-3-540-74472-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics