Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Fuzzy Based Feature Selection for Intrusion Detection System

Author : P.Indira priyadarsini 1 Ch.Anuradha 2 P.S.R. Chandra Murty 3

Date of Publication :9th November 2017

Abstract: An Intrusion Detection System (IDS) gathers and evaluates information from different locations, and finds potential security risks that include exterior as well as inside of the organization. It contains an enormous volume of data with irrelevant and redundant features which result in longer processing time and poor detection rate. So, feature selection should be empowered as an important characteristic for better performance on massive datasets. Feature selection refines the high dimensional data sets by removing over fitting and curse of dimensionality problems mainly in the domain of machine learning. The perceptive of feature selection lies in increasing the accurateness. In this paper, Fuzzy_Chi_Euc algorithm was given for selecting best features in KDD Cup 99 data set. In this algorithm integration of two filtering methods is done. The fuzzy inference rules are applied for selecting the features. The classification is carried out for finding intrusion and normal data using Support Vector Machines (SVMs). From the experiments conducted it is shown, most significant and relevant features are thus helpful for classification, which, in turn, reduce the time of training with better classification accuracy

Reference :

    1. Hasan, M.A.M., Nasser, M. and Pal, B.:On the KDD’99 Dataset: Support Vector Machine Based Intrusion Detection System (IDS) with Different Kernels, IJECCE, vol. 4, 1164- 1170, (2013).
    2. Adebayo, O.A., Shi, Z., Shi, Z. and Adewale, O.S.: Network Anomalous Intrusion Detection Using Fuzzy-Bayes.Intelligent Information Processing III,vol.228,525-530, (2006). doi:https://doi.org/10.1007/978- 0-387- 44641-7_56.
    3. Chen, Y., Abraham, A. and Yang, J.:Feature Selection and Intrusion Detection Using Hybrid Flexible Neural tree. Advances in Neural Networks—ISNN 2005, 439-444. (2005).doi.http://dx.doi.org/10.1007/11427469_71.
    4. W. Lee, S. J. Stolfo, and K. W. Mok.: Adaptive intrusion detection: A data mining Approach.AI Review, vol.14,I(6):533 – 567, (2000), doi.http://dx.doi.org/10.1023/A:1006624031083.
    5. Khalid,S,Khalil,T, & Nasreen S.: A survey of feature selection and feature extraction techniques in machine learning. Science and Information Conference (SAI) 372– 378, (2014).
    6. L. Ladla and T. Deepa .:Feature Selection Methods and Algorithms. International Journal on Computer Science and Engineering (IJCSE), Vol.3 I (5), 1787-1797, (2011).
    7. Xin Jin, Anbang Xu,Rongfang Bie1, Ping Guo.: Machine Learning Techniques and Chi-Square Feature Selection. Springer-Verlag Berlin Heidelberg LNBI 3916, pp. 106 – 115, (2006).
    8. Mohammed A.Ambusaidi, Xiangjian He, Priyadarsi Nanda,Zhiyuan Tan.:Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm‖, IEEE Transactions on Computers ,Vol. 65, I(10), Oct(2016).
    9. A Abraham, S Chebrolu, J P. Thomas .:Feature deduction and ensemble design of intrusion detection systems. Computers & Security,Vol. 24, I(4), Pages 295-307, (2005). http://dx.doi.org/10.1016/j.cose.2004.09.008
    10. Zhe Gao,Yajing Xu,Fanyu Meng,Feng Qi,Zhiqing Lin .: Improved information gain based feature selection for text categorization. 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronics Systems (VITAE), (2014).doi: 10.1109/VITAE.2014.6934421.
    11. Panda, Mrutyunjaya, Ajith Abraham, and Manas Ranjan Patra.: A Hybrid Intelligent Approach for Network Intrusion Detection,International Conference on Communication Technology and System Design 2011,pp 1- 9 ,Procedia Engineering 30 (2012).
    12. Saurabh, Mukherjee, and Neelam Sharma.:Intrusion detection using naive Bayes classifier with feature reduction,‖ Procedia Technology vol.4, 119-128, (2012). doi: 10.1016/j.protcy.2012.05.017.
    13. Eunhye kim, seungmin lee, kihoon kwon.:feature construction scheme for efficient intrusion detection system, journal of information science and engineering vol.26, 527-547 (2010).
    14. P Indira Priyadarsini, I Ramesh Babu.:Building Efficient Intrusion Detection System using Factor Analysis and Support Vector Machines, in International Journal of Engineering Research and Technology, Vol3, (2014).
    15. K.Bajaj and A. Arora.:Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach. In International Journal of Computer Sciences.vol. 10, no. 4, pp. 324–329, (2013).
    16. M. Sharma, K. Jindal, and A. Kumar.:Intrusion Detection System using Bayesian Approach for Wireless Network, Int. J. Comput. Appl., vol. 48, I(5), pp. 29– 33, (2012).
    17. H. M. Imran, A. Bin Abdullah, M. Hussain, and S. Palaniappan.:Intrusions Detection based on Optimum Features Subset and Efficient Dataset Selection, IJEIT,vol. 2, I (6), pp. 265-270, (2012).
    18. Vimal Kumar Dubey,Amit Kumar Saxena.:Hybrid classification model of correlation-based feature selection and support vector machine, IEEE International Conference on Current Trends in Advanced Computin (ICCTAC) (2016), doi: 10.1109/ICCTAC.2016.7567338.
    19. M. Hall, Correlation Based Feature Selection forMachine Learning, Doctoral Dissertation, The University of Waikato, Department of Computer Science, (1999).
    20. Z. Karimi and A. Harounabadi.:Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods,Int. J. Comput. Appl. (0975 – 8887), vol. 78,I(4), pp. 21–27, (2013).
    21. Cortes C.,Vapnik V.:Support vector networks, in Proceedings of Machine Learning pp.273–297, (1995).
    22. P Indira priyadarsini, Nagaraju Devarakonda,I Ramesh Babu,‖A Chock Full Survey on Support Vector Machines‖, International Journal of Computer Science and Software Engineering,Vol 3,I(10),(2013).
    23. http://web.pdx.edu/~newsomj/da1/ho_chisq.pdf
    24. http://www.econ.upf.edu/~michael/stanford/maeb4.pdf
    25. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani .:A Detailed Analysis of the KDD CUP 99 Data Set, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defence Applications, (2009).
    26. Timothy J. Ross.:Fuzzy Logic with Engineering Applications (3rd Edition), John Wiley & Sons, New Jersey, USA,.
    27. Chebrolu, S., Abraham, A. and Thomas, J.P. (2004) Hybrid Feature Selection for Modeling Intrusion Detection Systems. Neural Information Processing, 1020-1025, (2010). http://dx.doi.org/10.1007/978-3-540-30499-9_158.
    28. M. Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer.: The WEKA data mining software: an update," ACM SIGKDD Explorations Newsletter, vol. 11, I(1), pp. 10-18, (2009).

Recent Article