Skip to main content
Log in

Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the growth and benefits of network usage, securing the networks by using anomaly intrusion detection systems (IDS) against unknown intrusions has become an important issue. The first step of protecting any network is the detection of attacks. In this paper, we concentrate on four attacks; denial of service (DoS), probing, remote-to-local, and user-to-root attacks. We depend on features extracted from (NSL-KDD) dataset for these attacks. We investigate the performance of the attack detection process for several numbers of features using various subset-based feature selection techniques aiming to find the optimum collection of features for detecting each attack with an appropriate classifier. Simulation results reveal that redundant features can be eliminated from the attack detection process, and that we can determine the most useful set of features for a certain classifier, which enhances the IDS performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Sen, S. (2015). Chapter 4: A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.

    Chapter  Google Scholar 

  2. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Second IEEE symposium on computational intelligence.

  3. http://www.unb.ca/cic/datasets/nsl.html. Accessed 11 April 2016.

  4. Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147–157.

    Article  Google Scholar 

  5. Zargar, G., & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259–271.

    Article  Google Scholar 

  6. www.softcomputing.net. Accessed August 1, 2015.

  7. Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition, 42, 1330–1339.

    Article  MATH  Google Scholar 

  8. Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010). Feature selection: An eve evolving frontier in data mining. In: JMLR: Workshop and conference proceedings (Vol. 4, pp. 4–13). Publisher Citeseer.

  9. Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral dissertation, Department of Computer Science, University of Waikato.

  10. Thanah, H., Franke, K., & Pertovic, S. (2012). Chapter 2: Feature extraction methods for intrusion detection systems. In M. Gupta (Ed.), Threats countermeasures and advances in applied information security (pp. 23–52). IGI Global: Hershey.

    Google Scholar 

  11. Vege, S. H. (2010). Ensemble of feature selection techniques for high dimensional data. Published Master’s thesis, Western Kentucky University.

  12. Wang, Y., & Makedon, F. (2004). Application of relief feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In: Computational systems bioinformatics conference, IEEE (pp. 497–498).

  13. Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches. IJECSE, 1, 1044–1051.

    Google Scholar 

  14. Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In: International conference on parallel (pp. 82–87).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fathi E. Abd El-Samie.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghazy, R.A., EL-Rabaie, ES.M., Dessouky, M.I. et al. Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers. Wireless Pers Commun 100, 1689–1706 (2018). https://doi.org/10.1007/s11277-018-5662-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5662-0

Keywords

Navigation