On Attack-Relevant Ranking of Network Features

Abstract

An Intrusion Detection System (IDS) is an important component of the defense-in-depth security mechanism in any computer network system. For assuring timely detection of intrusions from millions of connection records, it is important to reduce the number of connection features examined by the IDS, using feature selection or feature reduction techniques. In this scope, this paper presents the first application of a distinctive feature selection method based on neural networks to the problem of intrusion detection, in order to determine the most relevant network features, which is an important step towards constructing a lightweight anomaly-based intrusion detection system. The same procedure is used for feature selection and for attack detection, which gives more consistency to the method. We apply this method to a case study, on KDD dataset and show its advantages compared to some existing feature selection approaches. We then measure its dependence to the network architecture and the learning database.

Authors and Affiliations

Adel Ammar, Khaled Al-Shalfan

Keywords

Related Articles

Binary PSOGSA for Load Balancing Task Scheduling in Cloud Environment

In cloud environments, load balancing task scheduling is an important issue that directly affects resource utilization. Unquestionably, load balancing scheduling is a serious aspect that must be considered in the cloud r...

Real Time Monitoring of Human Body Vital Signs using Bluetooth and WLAN

The technology of telemedicine is emerging and advancing day by day, it is capable of taking the field of healthcare to a whole new level of personalization. A person can keep a close check on his/her health's critical s...

Detection and Prevention of SQL Injection Attack by Dynamic Analyzer and Testing Model

With the emergence and popularity of web application, threats related to web applications has increased to large extent. Among many other web applications threats Structured Query Language Injection Attack (SQLIA) is the...

Variational Formulation of the Template-Based Quasi-Conformal Shape-from-Motion from Laparoscopic Images

One of the current limits of laparosurgery is the absence of a 3D sensing facility for standard monocular laparoscopes. Significant progress has been made to acquire 3D from a single camera using Visual SLAM (Simultaneou...

Development of Interactive Ophthalmology Hologram

Ophthalmology is one of the medical branches that deal with the eye. This field is associated with the anatomy, physiology and diseases of the eye. The main objective of this paper is to develop a novel interactive simul...

Download PDF file
  • EP ID EP153866
  • DOI 10.14569/IJACSA.2015.061130
  • Views 87
  • Downloads 0

How To Cite

Adel Ammar, Khaled Al-Shalfan (2015). On Attack-Relevant Ranking of Network Features. International Journal of Advanced Computer Science & Applications, 6(11), 229-236. https://europub.co.uk/articles/-A-153866