Skip to main content
Log in

Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper investigates the performance of different feature selection techniques such as ranking and subset-based techniques, aiming to find the optimum collection of features to detect attacks with an appropriate classifier. The results reveal that more accuracy of detection and less false alarms are obtained after eliminating the redundant features and determining the most useful set of features, which increases the intrusion detection system (IDS) performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Sen, S. (2015). A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.

    Chapter  Google Scholar 

  2. Gyanchandani, M., Yadav, R. N., & Rana, J. L. (2010). Intrusion detection using C4. 5: performance enhancement by classifier combination. International Journal on Signal and Image Processing,1(03), 46–49.

    Google Scholar 

  3. Garg, T., & Khurana, S. S. (2014). Comparison of classification techniques for intrusion detection dataset using WEKA. In International conference on recent advances and innovations in engineering (ICRAIE-2014) (pp. 1–5). IEEE.

  4. Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In International conference on parallel (pp. 82–87).

  5. Tavallaee, M., & Bagheri, E., Lu, W., & Ghorbani, A. (2009) A detailed analysis of the KDD CUP 99 dataset. In The second IEEE symposium on computational intelligence.

  6. http://TheNSL-KDDDataset.htm Accessed April 11, 2016.

  7. Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC),5(4), 147–157.

    Article  Google Scholar 

  8. Zargar, Gh, & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security,3, 259–271.

    Article  Google Scholar 

  9. www.softcomputing.net. Accessed August 1, 2015.

  10. Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition,42, 1330–1339.

    Article  Google Scholar 

  11. Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010) Feature selection: An eve evolving frontier in data mining. In Workshop and conference proceedings (Vol. 4, pp. 4–13), Publisher Citeseer.

  12. Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral Dissertation, Department of Computer Science, University of Waikato.

  13. Thanah, H., Franke, K. S. (2012). Pertovic feature extraction methods for intrusion detection systems. In Threats countermeasures and advances in applied information security (pp. 23–52).

  14. Sri Harsha, V. (2010). Ensemble of feature selection techniques for high dimensional data Published Master’s Thesis. Western Kentucky University.

  15. Wang, Y., & Makedon, F. (2004). Application of relief-F feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In Proceedings 2004 IEEE computational systems bioinformatics conference, 2004. CSB 2004. (pp. 497–498). IEEE.

  16. Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches, IJECSE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rania A. Ghazy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghazy, R.A., El-Rabaie, ES.M., Dessouky, M.I. et al. Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection. Wireless Pers Commun 111, 375–393 (2020). https://doi.org/10.1007/s11277-019-06864-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06864-3

Keywords

Navigation