Combinational feature selection approach for network intrusion detection system

dc.contributor.authorGarg, T.
dc.contributor.authorKumar, Y.
dc.date.accessioned2018-07-14T01:18:38Z
dc.date.accessioned2024-08-14T05:05:39Z
dc.date.available2018-07-14T01:18:38Z
dc.date.available2024-08-14T05:05:39Z
dc.date.issued2015
dc.description.abstractIn the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn't have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance. ? 2014 IEEE.en_US
dc.identifier.citationGarg, T., & Kumar, Y. (2015). Combinational feature selection approach for network intrusion detection system. Paper presented at the Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014.en_US
dc.identifier.doi10.1109/PDGC.2014.7030720
dc.identifier.isbn9.78E+12
dc.identifier.urihttps://kr.cup.edu.in/handle/32116/1275
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7030720/
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.subjectComputer crimeen_US
dc.subjectComputer networksen_US
dc.subjectData miningen_US
dc.subjectFeature extractionen_US
dc.subjectGrid computingen_US
dc.subjectMobile securityen_US
dc.subjectNetwork securityen_US
dc.subjectBoolean AND operatoren_US
dc.subjectIntrusion Detection Systemsen_US
dc.subjectNSL-KDD dataseten_US
dc.subjectRanking techniqueen_US
dc.subjectSelection techniquesen_US
dc.subjectWEKAen_US
dc.subjectIntrusion detectionen_US
dc.titleCombinational feature selection approach for network intrusion detection systemen_US
dc.title.journalProceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014en_US
dc.typeConference Paperen_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
20.pdf
Size:
208.07 KB
Format:
Adobe Portable Document Format