A FEATURE SELECTION TECHNIQUE FOR INTRUSION DETECTION SYSTEM BASED ON IWD AND ACO

Main Article Content

Shailendra Singh

Abstract

Rapid advancements in the internet technology and its vulnerabilities have led researchers to devise intelligent systems that can provide network security. Intrusion detection systems (IDS) scrutinize all the features to detect intrusive data. Some of the features may be redundant or irrelevant to the detection process, which results in computational complexities and increased training time. To mitigate this problem, a process known as feature selection is used to remove the redundant and irrelevant attributes of the dataset. This paper proposes an intelligent hybrid technique for the purpose of feature selection of KDD CUP’99 dataset using the concepts of metaheuristic optimization. This hybrid approach combines the concepts of Intelligent Water Drops(IWD) and Ant Colony Optimization(ACO)to select features from data. The objective of this work is to optimize the process of feature selection in order to achieve optimal feature subset and reduce the training time.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Shailendra Singh

Professor Department of Computer Engineering and Applications National Institute of Technical Teachers' Training & Research, Bhopal (Under Ministry of Human Resource Development, Govt. of India) Shamla Hills, Shanti Marg, Bhopal - 462 002, M.P. INDIA Tel.+91(0)755 2661 600 - ext.395 Fax:+91(0)755 2661 996

References

S. Singh and S. Silakari, "A survey of cyber-attack detection systems," International Journal of Computer Science and Network Security 9.5 (2009): 1-10.

K. El-Khatib, "Impact of feature reduction on the efficiency of wireless intrusion detection systems," IEEE TRANSACTIONS on parallel and distributed systems 21.8 (2010): 1143-1149.

M. H. Aghdam, and P. Kabiri, "Feature Selection for Intrusion Detection System Using Ant Colony Optimization," IJ Network Security 18.3 (2016): 420-432.

M.A. Ambusaidi , X. He, , P. Nanda, and Z. Tan, “Building an intrusion detection system using a filter-based feature selection algorithm,†IEEE transactions on computers, 65(10), pp.2986-2998..

S. O. Al-mamory and F. S. Jassim, (2015), “On the designing of two grains levels network intrusion detection system,†Karbala International Journal of Modern Science, 1(1), 15-25.

S. Mukkamala and A. Sung, (2003), “Feature selection for intrusion detection with neural networks and support vector machines,†Transportation Research Record: Journal of the Transportation Research Board, (1822), 33-39.

S. Ganapathy, K. Kulothungan, , S. Muthurajkumar, M. Vijayalakshmi, P. Yogesh, A. Kannan, (2013), “Intelligent feature selection and classification techniques for intrusion detection in networks: a survey,†EURASIP Journal on Wireless Communications and Networking, 2013(1), 271.

R. C., Chen, K. F. Cheng, Y. H. Chen, , and C. F. Hsieh, (2009, April), “Using rough set and support vector machine for network intrusion detection system,†In Intelligent Information and Database Systems, 2009. ACIIDS 2009. First Asian Conference on (pp. 465-470). IEEE.

F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, (2010, November), “Principle components analysis and support vector machine based intrusion detection system,†In Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on (pp. 363-367). IEEE.

B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, , A. Maralani, M. Eslami, M. J. Golkar and A. Ebrahimi, (2016), “A hybrid method consisting of GA and SVM for intrusion detection system,†Neural Computing and Applications, 27(6), 1669-1676.

H. Shah-Hosseini, (2009), “Optimization with the nature-inspired intelligent water drops algorithm,†In Evolutionary computation. InTech.

B. O. Alijla, C. P. Lim, A. T. Khader and M. A. Al-Betar, (2013, March), “Intelligent Water Drops Algorithm for Rough Set Feature Selection,†In ACIIDS (2) (pp. 356-365)..

D. Martens, B. Baesens and T. Fawcett, (2011), “Editorial survey: swarm intelligence for data mining,†Machine Learning, 82(1), 1-42.

C. F. Tsai, Y. F. Hsu, , C. Y. Lin, and W. Y. Lin, (2009), “Intrusion detection by machine learning: A review,†Expert Systems with Applications, 36(10), 11994-12000.

S. Singh and S. Silakari, (2009), “A survey of cyber-attack detection systems,†International Journal of Computer Science and Network Security, 9(5), 1-10.

F. Iglesias and T. Zseby, (2015), “Analysis of network traffic features for anomaly detection,†Machine Learning, 101(1-3), 59-84..

F. Haneef, G. R. Kushwaha, and A. K. Dubey, (2011, June), “Analysis with Data Mining and Ant Colony Algorithm for Implementing of Object Pool Optimization,†In Communication Systems and Network Technologies (CSNT), 2011 International Conference on (pp. 313-317). IEEE.

N. Acharya, and S. Singh, (2017), “An IWD-based feature selection method for intrusion detection system,†Soft Computing, 1-10.

I. Ahmad, M. Hussain, A. Alghamdi and A. Alelaiwi, (2014), “Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components,†Neural Computing and Applications, 24(7-8), 1671-1682.