Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 131))

Abstract

Intrusion detection system (IDS) detects an illegal exploitation of computer systems. In intrusion detection systems, feature selection plays an important role in a sense of improving classification performance and reducing the computational complexity. In this paper, we focus on improving identification of major network attacks like DoS, R2L and Probe using various feature selection techniques (IG, CHI2 and OCFS). This research work explored the possibility of employing a variety of classifiers, but limited to J48, Naive Bayes and AdaBoost. Empirical evaluations were completed based on a standard network intrusion data set (KDDCUP99). The Experimental results show that the feature selection approach gives considerable increase of performance in detecting network intrusions as compared to normal approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mitra, P., Murthy, C.A., Pal, S.K.: Unsupervised feature selection using feature similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 301–312 (2002)

    Article  Google Scholar 

  2. Liu, H., Motoda, H., Yu, L.: Feature Selection with Selective Sampling. In: Proceedings of the19th International Conference on Machine Learning, pp. 395–402 (2002)

    Google Scholar 

  3. Robnik-Sikonja, M., Kononenko, I.: Theoretical and empirical analysis of Relief and ReliefF. Machine Learning - ML 53(1-2), 23–69 (2003)

    Article  Google Scholar 

  4. Kim, Y., Street, W., Menczer, F.: Feature selection for unsupervised learning via evolutionary search. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 365–369 (2000)

    Google Scholar 

  5. Dash, M., Choi, K., Scheuermann, P., Liu, H.: Feature selection for clustering – a filter solution. In: Proceedings of IEEE International Conference on Data Mining, pp. 115–122 (2002)

    Google Scholar 

  6. Koller, Sahami, M.: Toward optimal feature selection. In: Proceedings of the Thirteenth International Conference on Machine Learning, pp. 84–292 (1996)

    Google Scholar 

  7. Kira, K., Rendell, L.A.: The Feature Selection Problem: Traditional methods and a new algorithm. In: Proceedings of Ninth National Conference on Artificial Intelligence, vol. 21, pp. 129–134 (1992)

    Google Scholar 

  8. Blum, L., Langley, P.: Selection of relevant features and examples in machine learning. Artificial Intelligence 97, 245–271 (1997)

    Article  MathSciNet  Google Scholar 

  9. Novakovic, J.: Using Information Gain Attribute Evaluation to Classify Sonar Targets. In: 17th Telecommunications forum TELFOR (2009)

    Google Scholar 

  10. Méndez, J.R., Fdez-Riverola, F., D´ıaz, F., Iglesias, E.L., Corchado, J.M.: A comparative performance study of feature selection methods for the anti-spam filtering domain. In: Industrial Conference on Data Mining, pp. 106–120 (2006)

    Chapter  Google Scholar 

  11. Yan, J., Zhang, B., Liu, N., Yan, S., Cheng, Q., Fan, W., Yang, Q., Xi, W., Chen, Z.: Effective and Efficient Dimensionality Reduction for Large-Scale and Streaming Data Preprocessing. IEEE Transactions on Knowledge and Data Engineering 18(3), 320–333 (2006)

    Article  Google Scholar 

  12. Papadogiannakis, A., Polychronakis, M., Markatos, E.P.: Improving the Accuracy of Network Intrusion Detection System Under. Load Using Selective Packet Discarding. In: European Conference on Computer System, Paris, France (2010)

    Google Scholar 

  13. Faizal, M.A., Mohd Zaki, M., Sahib, S., Robiah, Y., Siti Rahayu, S., Asrul Hadi, Y.: Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System, netapps. In: Second International Conference on Network Applications, Protocols and Services, pp. 148–152 (2010)

    Google Scholar 

  14. Sung, A., Mukkamala, S.: Identifying important features for intrusion detection using SVM and neural networks. In: Symposium on Application and the Internet, pp. 209–216 (2003)

    Google Scholar 

  15. Elkan: Results of the KDD’99 Knowledge Discover Contest, http://www.cse.ucsd.edu/users/elkan/clresults.html

  16. WEKA: Software machine learning, the University of Waikato, Hamilton, New-Zealand

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prajakta Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer India Pvt. Ltd.

About this paper

Cite this paper

Patil, P., Attar, V. (2012). Intelligent Detection of Major Network Attacks Using Feature Selection Methods. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 131. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0491-6_61

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0491-6_61

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-0490-9

  • Online ISBN: 978-81-322-0491-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics