
Asian Journal of Computer Science and Technology (AJCST)
A Comparative Study on the Feature Selection Techniques for Intrusion Detection System
Author : D. Selvamani and V. SelviVolume 8 No.1 January-March 2019 pp 42-47
Abstract
The Intrusion Detection System (IDS) can be used broadly for securing the network. Intrusion detection systems (IDS) are typically positioned laterally through former protecting safety automation, like access control and verification, as a subsequent line of resistance that guards data classifications. Feature selection is employed to diminish the number of features in various applications where data has more than hundreds of attributes. Essential or relevant attribute recognition has converted a vital job to utilize data mining algorithms efficiently in today world situations. This article describes the comparative study on the Information Gain, Gain Ratio, Symmetrical Uncertainty, Chi-Square analysis feature selection techniques with different Classification methods like Artificial Neural Network, Naïve Bayes and Support Vector Machine. In this article, different performance metrics has utilized to choose the appropriate Feature Selection method for better data classification in IDS.
Keywords
Intrusion Detection, Feature Selection, Information Gain, Gain Ratio, Symmetrical Uncertainty, Chi-Square, Classification, ANN, Naïve Bayes and Support Vector Machine
References
[1] Shengyi Pan, Thomas Morris and Uttam Adhikari, “Developing a hybrid intrusion detection system using data mining for power systems,” IEEE Transactions on Smart Grid, Vol. 6, No. 6, pp. 3104-3113, 2015.
[2] Syed Ali Raza Shah and Biju Issac, “Performance comparison of intrusion detection systems and application of machine learning to Snort system,” Future Generation Computer Systems, Vol. 80, pp. 157-170, 2018.
[3] M. Elbasiony, Reda, et al., “A hybrid network intrusion detection framework based on random forests and weighted k-means,” Ain Shams Engineering Journal, Vol. 4, No. 4, pp. 753-762, 2013.
[4] Iftikhar Ahmad, et al., “Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components,” Neural computing and applications, Vol. 24, No. 7-8, pp.1671-1682, 2014.
[5] Aburomman, Abdulla Amin and Mamun Bin Ibne Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Applied Soft Computing, Vol. 38, pp. 360-372, 2016.
[6] Thaseen, Ikram Sumaiya and Cherukuri Aswani Kumar, “Intrusion detection model using fusion of chi-square feature selection and multi class SVM,” Journal of King Saud University-Computer and Information Sciences, Vol. 29, No. 4, pp. 462-472, 2017.
[7] Li, Longjie, et al., “Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO,” Journal of Sensors, 2018.
[8] Pereira, Rafael B., et al., “Categorizing feature selection methods for multi-label classification”, Artificial Intelligence Review, Vol. 49, No. 1, pp. 57-78, 2018.
[9] Sheikhpour, Razieh, et al., “A survey on semi-supervised feature selection methods”, Pattern Recognition, Vol. 64, pp. 141-158, 2017.
[10] Jadhav, Swati, Hongmei He, and Karl Jenkins, “Information gain directed genetic algorithm wrapper feature selection for credit rating”, Applied Soft Computing, Vol. 69, pp. 541-553, 2018.
[11] Venkataraman, Sivakumar, and Rajalakshmi Selvaraj, “Optimal and Novel Hybrid Feature Selection Framework for Effective Data Classification”, Advances in Systems, Control and Automation, Springer, Singapore, pp. 499-514, 2018.
[12] Thaseen, Ikram Sumaiya, and Cherukuri Aswani Kumar, “Intrusion detection model using fusion of chi-square feature selection and multi class SVM”, Journal of King Saud University-Computer and Information Sciences, Vol. 29, No. 4, pp. 462-472, 2017.
[13] Moayedikia, Alireza, et al., “Feature selection for high dimensional imbalanced class data using harmony search”, Engineering Applications of Artificial Intelligence, Vol. 57, pp. 38-49, 2017.
[14] Wang, Yintong, et al., “An efficient semi-supervised representatives feature selection algorithm based on information theory”, Pattern Recognition, Vol. 61, pp. 511-523, 2017.
[15] Dataset Source: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html.