A FEATURE SELECTION TECHNIQUE FOR INTRUSION DETECTION SYSTEM BASED ON IWD AND ACO

Farha Haneef, Shailendra Singh

Abstract


Rapid advancements in the internet technology and its vulnerabilities have led researchers to devise intelligent systems that can provide network security. Intrusion detection systems (IDS) scrutinize all the features to detect intrusive data. Some of the features may be redundant or irrelevant to the detection process, which results in computational complexities and increased training time. To mitigate this problem, a process known as feature selection is used to remove the redundant and irrelevant attributes of the dataset. This paper proposes an intelligent hybrid technique for the purpose of feature selection of KDD CUP’99 dataset using the concepts of metaheuristic optimization. This hybrid approach combines the concepts of Intelligent Water Drops(IWD) and Ant Colony Optimization(ACO)to select features from data. The objective of this work is to optimize the process of feature selection in order to achieve optimal feature subset and reduce the training time.

Keywords


Intrusion Detection System,; Feature Selection; Ant Colony Optimization; Intelligent Water Drops; Metaheuristic Optimization.

Full Text:

PDF

References


S. Singh and S. Silakari, "A survey of cyber-attack detection systems," International Journal of Computer Science and Network Security 9.5 (2009): 1-10.

K. El-Khatib, "Impact of feature reduction on the efficiency of wireless intrusion detection systems," IEEE TRANSACTIONS on parallel and distributed systems 21.8 (2010): 1143-1149.

M. H. Aghdam, and P. Kabiri, "Feature Selection for Intrusion Detection System Using Ant Colony Optimization," IJ Network Security 18.3 (2016): 420-432.

M.A. Ambusaidi , X. He, , P. Nanda, and Z. Tan, “Building an intrusion detection system using a filter-based feature selection algorithm,” IEEE transactions on computers, 65(10), pp.2986-2998..

S. O. Al-mamory and F. S. Jassim, (2015), “On the designing of two grains levels network intrusion detection system,” Karbala International Journal of Modern Science, 1(1), 15-25.

S. Mukkamala and A. Sung, (2003), “Feature selection for intrusion detection with neural networks and support vector machines,” Transportation Research Record: Journal of the Transportation Research Board, (1822), 33-39.

S. Ganapathy, K. Kulothungan, , S. Muthurajkumar, M. Vijayalakshmi, P. Yogesh, A. Kannan, (2013), “Intelligent feature selection and classification techniques for intrusion detection in networks: a survey,” EURASIP Journal on Wireless Communications and Networking, 2013(1), 271.

R. C., Chen, K. F. Cheng, Y. H. Chen, , and C. F. Hsieh, (2009, April), “Using rough set and support vector machine for network intrusion detection system,” In Intelligent Information and Database Systems, 2009. ACIIDS 2009. First Asian Conference on (pp. 465-470). IEEE.

F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, (2010, November), “Principle components analysis and support vector machine based intrusion detection system,” In Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on (pp. 363-367). IEEE.

B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, , A. Maralani, M. Eslami, M. J. Golkar and A. Ebrahimi, (2016), “A hybrid method consisting of GA and SVM for intrusion detection system,” Neural Computing and Applications, 27(6), 1669-1676.

H. Shah-Hosseini, (2009), “Optimization with the nature-inspired intelligent water drops algorithm,” In Evolutionary computation. InTech.

B. O. Alijla, C. P. Lim, A. T. Khader and M. A. Al-Betar, (2013, March), “Intelligent Water Drops Algorithm for Rough Set Feature Selection,” In ACIIDS (2) (pp. 356-365)..

D. Martens, B. Baesens and T. Fawcett, (2011), “Editorial survey: swarm intelligence for data mining,” Machine Learning, 82(1), 1-42.

C. F. Tsai, Y. F. Hsu, , C. Y. Lin, and W. Y. Lin, (2009), “Intrusion detection by machine learning: A review,” Expert Systems with Applications, 36(10), 11994-12000.

S. Singh and S. Silakari, (2009), “A survey of cyber-attack detection systems,” International Journal of Computer Science and Network Security, 9(5), 1-10.

F. Iglesias and T. Zseby, (2015), “Analysis of network traffic features for anomaly detection,” Machine Learning, 101(1-3), 59-84..

F. Haneef, G. R. Kushwaha, and A. K. Dubey, (2011, June), “Analysis with Data Mining and Ant Colony Algorithm for Implementing of Object Pool Optimization,” In Communication Systems and Network Technologies (CSNT), 2011 International Conference on (pp. 313-317). IEEE.

N. Acharya, and S. Singh, (2017), “An IWD-based feature selection method for intrusion detection system,” Soft Computing, 1-10.

I. Ahmad, M. Hussain, A. Alghamdi and A. Alelaiwi, (2014), “Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components,” Neural Computing and Applications, 24(7-8), 1671-1682.




DOI: https://doi.org/10.26483/ijarcs.v8i9.4857

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science