CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection

by Janmejay Pant, Bhaskar Pant, Amit Juyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 14
Year of Publication: 2014
Authors: Janmejay Pant, Bhaskar Pant, Amit Juyal
10.5120/17251-7591

Janmejay Pant, Bhaskar Pant, Amit Juyal . Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection. International Journal of Computer Applications. 98, 14 ( July 2014), 16-18. DOI=10.5120/17251-7591

@article{ 10.5120/17251-7591,
author = { Janmejay Pant, Bhaskar Pant, Amit Juyal },
title = { Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number14/17251-7591/ },
doi = { 10.5120/17251-7591 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:12.322981+05:30
%A Janmejay Pant
%A Bhaskar Pant
%A Amit Juyal
%T Comparative Study of Different Models before Feature Selection and AFTER Feature Selection for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 14
%P 16-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A network data set may contain a huge amount of data and processing this huge amount of data is one of the most challenges task for network based intrusion detection system (IDS). Normally these data contain lots of redundant and irrelevant features. Feature selection approaches are used to extract the relevant features from the original data to improve the efficiency or accuracy of IDS. In this paper an effective feature selection approaches are used for the NSL KDD data set. The performance of the used classifiers measure and compared with each other.

References
  1. R. Agarwal and M. V. Joshiy, PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection) ,Citeseer2000.
  2. M. Sheikhan, et al. , Application of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection, Majlesi Journal of Electrical Engineering, vol. 5, 2011.
  3. R. Chattemvelli and R. Sridevi, GA Approach for Network Intrusion Detection, International Journal of Research and Reviews in Information Sciences (IJRRIS), vol. 1, 2012.
  4. M. Kantardzic, Data mining: concepts, models, methods, and algorithms: Wiley-IEEE Press, 2011.
  5. L. Yu and H. Liu, Efficient Feature Selection via Analysis of Relevance and Redundancy,Journal of Machine Learning Research, vol. 5, Dec. 2004, pp. 1205 -1224.
  6. P. Patil, V. Attar, Intelligent Detection of Major Network Attacks Using Feature Selection Methods,Proc. International Conference on Soft Computing for Problem Solving (SocProS 2011),Springer Press, Dec. 2011, pp. 671-679, doi: 10. 1007/978-81-322-0491-6_61.
  7. M. Y. Su, K. C. Chang, H. F. Wei, and C. Y. Lin, Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN, Intelligence and Security" June 2008
  8. H. Liu and H. Motoda, Feature Selection for Knowledge Discovery and Data Mining, Boston:Kluwer Academic, 1998.
  9. I. Guyon and A. Elisseeff, An Introduction to Variable and Feature Selection, Journal of Machine Learning Research, vol. 3, Jan. 2003, pp. 1157 -1182.
  10. Y. Chen, Y. Li, X. Q. Cheng, and L. Guo, Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System, Information Security and Cryptology, vol. 4318,Dec. 2006,pp. 153-167.
  11. T. M. Chen, X. M. Pan, Y. G. Xuan, J. X. Ma, and J. Jiang, A Naïve Feature Selection Method and Its Application in Network Intrusion Detection, Proc. International Conference on Computational Intelligence and Security(CIS '10), IEEE Press, Dec 2010, pp. 416-420,doi: 10. 1109/CIS. 2010. 96.
  12. G. R. Zargar and P. Kabiri, Selection of Effective Network Parameters in Attacks for Intrusion Detection, Advances in Data Mining. Applications and Theoretical Aspects: Lecture Notesin Computer Science, vol. 6171,July 2010.
  13. Y. Chen, Y. Li, X. Q. Cheng, and L. Guo, Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System, Information Security and Cryptology, vol. 4318,Dec. 2006,pp. 153-167.
  14. Y. Li, B. Fang, Y. Chen, and L. Guo, A Lightweight Intrusion Detection Model Based on Feature Selection and Maximum Entropy Model, Proc. International Conference on Communication Technology(ICCT '06), IEEE Press,Nov. 2006.
  15. G. Stein, B. Chen, A. S. Wu, and K. A. Hua, Decision Tree Classifier For Network Intrusion Detection With GA-based Feature Selection, Proc. the 43rd annual Southeast regional conference, ACM, Mar2005, pp. 136-141, doi: 10. 1145/1167253. 1167288.
  16. A. H. Sung and S. Mukkamala ,Identifying Important Features for Intrusion Detection using Support Vector Machines and Neural Networks, Proc. Symposium on Applications and the Interne (SAINT'03),IEEEPress,Jan. 2003.
  17. L. Yu and H. Liu, Efficient Feature Selection via Analysis of Relevance and Redundancy, Journal of Machine Learning Research, vol. 5, Dec. 2004, pp. 1205 -1224.
  18. J. R. Quinlan, C4 . 5: Programs for Machine Learning, Morgan Kaufman, 1993.
  19. K. Kira and L. A. Rendell, A Practical Approach to Feature Selection, Proc. Ninth International Workshop on Machine Learning, Morgan Kaufmann Publishers Inc. , 1992, pp. 249-256. 10. 1007/3 540-57868-4_57.
  20. H. Liu and R. Setiono, Chi2: Feature Selection and Discretization of Numeric Attributes, Proc. Seventh International Conference on Tools with Artificial Intelligence(TAI '95) , IEEE Press,Nov. 1995,pp. 388-391.
  21. Tavallaee, M. Bagheri,E. ,Lu,Wei. ,Ghorbani,A. A. : A detailed Analysis of the KDD CUP 99 Data Set ,In: the Proceedings of the 2009 Symposium on Computational Intelligence in Security and Defense Application,2009.
  22. T. Fawcett, An Introduction to ROC Analysis, PatternRecognitionletters,Vol. 27,June 2006,pp. 861-874.
Index Terms

Computer Science
Information Sciences

Keywords

Feature selection intrusion detection NSL-KDD Weka