A Subset Feature Elimination Mechanism for Intrusion Detection System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
Several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features contribute to represent the traffic, therefore reducing and selecting a number of adequate features may improve the speed and accuracy of the intrusion detection system. In this study, a feature selection mechanism has been proposed which aims to eliminate non-relevant features as well as identify the features which will contribute to improve the detection rate, based on the score each features have established during the selection process. To achieve that objective, a recursive feature elimination process was employed and associated with a decision tree based classifier and later on, the suitable relevant features were identified. This approach was applied on the NSL-KDD dataset which is an improved version of the previous KDD 1999 Dataset, scikit-learn that is a machine learning library written in python was used in this paper. Using this approach, relevant features were identified inside the dataset and the accuracy rate was improved. These results lend to support the idea that features selection improve significantly the classifier performance. Understanding the factors that help identify relevant features will allow the design of a better intrusion detection system.
Authors and Affiliations
Herve Nkiama, Syed Said, Muhammad Saidu
An Extensive Survey over Traffic Management/Load Balance in Cloud Computing
Cloud Computing (CC) is all about carrying out processing in other's system. There are various vendors who provide CC services. The basic algorithm that should be met to access CC services is a need for steady internet c...
Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing
Resource scheduling in cloud computing is a com-plex task due to the number and variety of resources available and the volatility of usage-patterns of resources considering that the resource setting is on the service pro...
Multi- Spectrum Bands Allocation for Time-Varying Traffic in the Flexible Optical Network
The flexible optical networks are the promising solution to the exponential increase of traffic generated by telecommunications networks. They combine flexibility with the finest granularity of optical resources. Therefo...
Risk Propagation Analysis and Visualization using Percolation Theory
This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how...
A Categorical Model of Process Co-Simulation
A set of dynamic systems in which some entities undergo transformations, or receive certain services in successive phases, can be modeled by processes. The specification of a process consists of a description of the prop...