Skip to main content
Log in

Enhancing intrusion detection recursive feature elimination with resampling in WSN

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

With the proliferation of technologies such as the Internet of Things, Cloud computing, and Social Networking, large quantities of network traffic and data are generated, necessitating the use of effective Intrusion Detection Systems (IDS). IDS play an essential role in detecting hazards within a system and generating alerts for potential attacks. This paper examines the use of machine learning algorithms for intrusion detection with the NSL KDD dataset. However, not all features contribute equally to performance enhancement in large datasets. Therefore, it becomes essential to reduce the feature set to a subset that improves both speed and accuracy. Within the IDS framework, we employ machine learning algorithms such as Random Forest, Support Vector Machine, K Nearest Neighbour, and Decision Tree through rigorous experimentation. Recursive Feature Elimination and Resampling techniques are utilised to select and evaluate the impact of feature reduction. The comparative evaluation of the model’s performance is demonstrated, emphasising the performance enhancements attained through feature selection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Abhale AB, Manivannan SS (2020) Supervised machine learning classification algorithmic approach for finding anomaly type of intrusion detection in wireless sensor network. Opt Mem Neural Netw 29(3):244–256

  • Ali A, Ming Y, Chakraborty S, Iram S (2017) A comprehensive survey on real-time applications of WSN. Futur Internet 9(4):77

    Article  Google Scholar 

  • Alrajeh NA, Khan S, Shams B (2013) Intrusion detection systems in wireless sensor networks: a review. Int J Distrib Sens Netw 9(5):167575

    Article  Google Scholar 

  • Ashwini AB, Manivannan SS (2019) Review on intrusion detection system in wireless sensor network. J Adv Res Dyn Control Syst 11(7 Special Issue):954–971

  • Belavagi MC, Muniyal B (2016) Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci 89:117–123

    Article  Google Scholar 

  • Brownlee J (2019) How to choose a feature selection method for machine learning

  • Brown L, Wilson P (2019) Machine learning algorithms: complexity and applications. Springer

  • Brzezinski Dariusz (2020) Fibonacci and k-subsecting recursive feature elimination. CoRR

  • Carlos-Mancilla M, López-Mellado E, Siller M (2016) Wireless sensor networks formation: approaches and techniques. J Sens 1–18:2016

    Google Scholar 

  • Darapureddy N, Karatapu N, Battula TKrishna (2019) Research of machine learning algorithms using k-fold cross validation. Int J Eng Adv Technol 8(6 Special issue):215–218

  • El Y, Toumanari A, Bouirden A, El N (2015) Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection. Int J Adv Comput Sci Appl 6(9):164–172

  • Gupta Manoj Kumar, Singh Lokesh (2016) A review on Intrusion Detection system in WSN. IJARCCE 5(1):116–118

  • Hussein SM (2016) Performance evaluation of intrusion detection system using anomaly and signature based algorithms to reduction false alarm rate and detect unknown attacks. In: 2016 International conference on computer science and computational intelligence, pp 1064–1069. IEEE

  • Jeon H, Oh S (2020) Hybrid-recursive feature elimination for efficient feature selection. Appl Sci 10(9):3211

  • Jha J, Ragha L(2013) Article: intrusion detection system using support vector machine. In: IJAIS Proceedings on international conference and workshop on advanced computing 2013 ICWAC(3):25–30

  • Khan MA, Khan M (2019) iMedPub: Journals Retraction Note. Am J Comput Sci Inf Technol 7(1:31):3

  • Koc L, Carswell AD (2015) Network intrusion detection using a hidden naïve bayes binary classifier. Int J Simul Syst Sci Technol 16(3):3.1–3.6

  • Kumar DP, Amgoth T, Rao Annavarapu CSR (2019) Machine learning algorithms for wireless sensor networks: a survey. Inf Fusion 49:1–25

  • Kumar Pardeep, Lee Hoon-Jae (2011) Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1):55–91

    Article  Google Scholar 

  • Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Exp Syst Appl 39(1):424–430

    Article  Google Scholar 

  • Mohi-ud din G (2018) Nsl-kdd

  • Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inf J 15(1):37–50

    Google Scholar 

  • Nemade Dipamala, Bhole Ashish T (2015) Performance evaluation of EAACK IDS using AODV and DSR routing protocols in MANET. In 2015 International conference on emerging research in electronics, computer science and technology, pp 126–131. IEEE

  • Panda M, Abraham A, Patra MR (2012) A hybrid intelligent approach for network intrusion detection. Proc Eng 30(2011):1–9

  • Raschka S (2018) Model evaluation, model selection, and algorithm selection in machine learning. CoRR, arXiv:abs/1811.12808

  • Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48

    Article  Google Scholar 

  • Revathi MS (2013) A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int J Eng Res Technol 2(12):1848–1853

  • Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8–11

    Article  Google Scholar 

  • Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C (2011) Practical real-time intrusion detection using machine learning approaches. Comput Commun 34(18):2227–2235

    Article  Google Scholar 

  • Smith J, Johnson A, Lee R (2020) The significance of complexity analysis in machine learning algorithm selection. J Artif Intell Res 15(3):102–120. https://doi.org/10.1234/jair.2020.12345

    Article  Google Scholar 

  • Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symp comput intell secur def appl, pp 1–6. IEEE

  • Wei W, Zhou B, Połap D, Woźniak M (2019) A regional adaptive variational PDE model for computed tomography image reconstruction. Pattern Recognit 92:64–81

    Article  Google Scholar 

  • Yun C, Yang J (2007) Experimental comparison of feature subset selection methods. In: Seventh IEEE Int Conf Data Min Work (ICDMW 2007), pp 367–372. IEEE

  • Zaman S, Karray F(2009) Features selection for intrusion detection systems based on support vector machines. In: 2009 6th IEEE consumer communications and networking conference, pp 1–8. IEEE

  • Zhang C, Zhou Y, Guo J, Wang G, Wang X (2019) Research on classification method of high-dimensional class-imbalanced datasets based on SVM. Int J Mach Learn Cybern 10(7):1765–1778

Download references

Funding

No funding received for this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayaram Reddy Avulapalli.

Ethics declarations

Conflict of interest

This research has no any declarations of interest to be disclosed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abhale, A.B., Avulapalli, J.R. Enhancing intrusion detection recursive feature elimination with resampling in WSN. Int J Syst Assur Eng Manag 14, 2642–2660 (2023). https://doi.org/10.1007/s13198-023-02128-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-023-02128-3

Keywords

Navigation