skip to main content
10.1145/3178212.3178234acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsebConference Proceedingsconference-collections
research-article

The Effect of Sizes of the Feature Sets on Intrusion Detection Performances

Authors Info & Claims
Published:28 December 2017Publication History

ABSTRACT

Adaptive Intrusion Detection System (IDS) is a class of IDS that uses observed flows behaviors to detect malicious activities -- usually with the aids of machine learning techniques. Most researches in this field focus on which features to be used or which classification methods to be employed. However, none have studied the impact of number of opted features on the accuracies of the anomaly detection or the smallest set of features that should be employed. This paper attempts to address these issues. We have applied feature selection algorithm, ReliefF [1] on NSL-KDD dataset [2] to select 10 most discriminative features out of 41 features. Then several machine learning algorithms are employed to classify normal and anomaly flows (both binary and multiple classes) using different set of features, each with different sizes. Experiment results show that >95% accuracies can be achieved with only 4-5 features and accuracy does not improve significantly after 6-7 features. We have also compared our results with other works and show that our work yields better results using the lower or the same number of features.

References

  1. Kononenko, I. Estimating attributes: Analysis and extensions of RELIEF. Springer Berlin Heidelberg, City, 1994.Google ScholarGoogle Scholar
  2. Tavallaee, M., Bagheri, E., Lu, W. and Ghorbani, A. A. A detailed analysis of the KDD CUP 99 data set. City, 2009.Google ScholarGoogle Scholar
  3. Anantavrasilp, I. and Scholer, T. Automatic flow classification using machine learning. City, 2007.Google ScholarGoogle Scholar
  4. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G. and Vázquez, E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28, 1 (2009/02/01/ 2009), 18-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Frank, J. Artificial Intelligence and Intrusion Detection: Current and Future Directions, 1995.Google ScholarGoogle Scholar
  6. Stolfo, S. J., Wei, F., Wenke, L., Prodromidis, A. and Chan, P. K. Cost-based modeling for fraud and intrusion detection: results from the JAM project. City, 2000.Google ScholarGoogle Scholar
  7. Pradhan, A. Network Traffic Classification using Support Vector Machine and Artificial Neural Network, 2011.Google ScholarGoogle Scholar
  8. Pervez, M. S. and Farid, D. M. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. City, 2014.Google ScholarGoogle Scholar
  9. Ingre, B. and Yadav, A. Performance analysis of NSL-KDD dataset using ANN. City, 2015.Google ScholarGoogle Scholar
  10. Yan, G. Network Anomaly Traffic Detection Method Based on Support Vector Machine. City, 2016.Google ScholarGoogle Scholar
  11. Quinlan, J. R. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cohen, W. W. Fast effective rule induction. City, 1995.Google ScholarGoogle Scholar
  13. John, G. H. and Langley, P. Estimating continuous distributions in Bayesian classifiers. Morgan Kaufmann Publishers Inc., City, 1995.Google ScholarGoogle Scholar
  14. Lippmann, R. An introduction to computing with neural nets. IEEE ASSP Magazine, 4, 2 (1987), 4-22.Google ScholarGoogle ScholarCross RefCross Ref
  15. Hearst, M. A., Dumais, S. T., Osuna, E., Platt, J. and Scholkopf, B. Support vector machines. IEEE Intelligent Systems and their Applications, 13, 4 (1998), 18-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Early, J. P., Brodley, C. E. and Rosenberg, C. Behavioral authentication of server flows. City, 2003.Google ScholarGoogle Scholar
  17. Benferhat, S. and Tabia, K. On the combination of naive Bayes and decision trees for intrusion detection. City, 2005.Google ScholarGoogle Scholar
  18. Miao, Y., Ruan, Z., Pan, L., Zhang, J., Xiang, Y. and Wang, Y. Comprehensive Analysis of Network Traffic Data. City, 2016.Google ScholarGoogle Scholar
  19. Boger, M., Liu, T., Ratliff, J., Nick, W., Yuan, X. and Esterline, A. Network traffic classification for security analysis. City, 2016.Google ScholarGoogle Scholar
  20. Kira, K. and Rendell, L. A. The feature selection problem: traditional methods and a new algorithm. In Proceedings of the Proceedings of the tenth national conference on Artificial intelligence (San Jose, California, 1992). AAAI Press, {insert City of Publication},{insert 1992 of Publication}. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Howcroft, J. Evaluation of Wearable Sensors as an Older Adult Fall Risk Assessment Tool. UWSpace, 2016.Google ScholarGoogle Scholar
  22. Witten, I. H., Frank, E., Hall, M. A. and Pal, C. J. Data mining: practical machine learning tools and techniques (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lesmeister, C. Mastering machine learning with R: master machine learning techniques with R to deliver insights for complex projects (2015).Google ScholarGoogle Scholar
  24. Zhang, M. and Sawchuk, A. A. A feature selection-based framework for human activity recognition using wearable multimodal sensors. In Proceedings of the Proceedings of the 6th International Conference on Body Area Networks (Beijing, China, 2011). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Effect of Sizes of the Feature Sets on Intrusion Detection Performances

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSEB '17: Proceedings of the 2017 International Conference on Software and e-Business
      December 2017
      141 pages
      ISBN:9781450354882
      DOI:10.1145/3178212

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 December 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader