DocumentCode :
1799727
Title :
A Novel Feature Selection Approach for Intrusion Detection Data Classification
Author :
Ambusaidi, Mohammed A. ; Xiangjian He ; Zhiyuan Tan ; Nanda, Priyadarsi ; Liang Fu Lu ; Nagar, Upasana T.
Author_Institution :
Center for Innovation in IT Services & Applic. (iNEXT) Sch. of Comput. & Commun., Univ. of Technol., Sydney, NSW, Australia
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
82
Lastpage :
89
Abstract :
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks are usually of very huge in size. This creates a major challenge to IDSs, which need to examine all features in the data to identify intrusive patterns. The objective of this study is to analyze and select the more discriminate input features for building computationally efficient and effective schemes for an IDS. For this, a hybrid feature selection algorithm in combination with wrapper and filter selection processes is designed in this paper. Two main phases are involved in this algorithm. The upper phase conducts a preliminary search for an optimal subset of features, in which the mutual information between the input features and the output class serves as a determinant criterion. The selected set of features from the previous phase is further refined in the lower phase in a wrapper manner, in which the Least Square Support Vector Machine (LSSVM) is used to guide the selection process and retain optimized set of features. The efficiency and effectiveness of our approach is demonstrated through building an IDS and a fair comparison with other stateof-the-art detection approaches. The experimental results show that our hybrid model is promising in detection compared to the previously reported results.
Keywords :
feature selection; filtering theory; least squares approximations; pattern classification; security of data; support vector machines; IDS; LSSVM; feature selection approach; filter selection process; intrusion detection data classification; least square support vector machine; wrapper selection process; Accuracy; Feature extraction; Intrusion detection; Mutual information; Redundancy; Support vector machines; Training; Feature selection; Floating search; Intrusion detection; Least square support vector machines; Mutual information;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/TrustCom.2014.15
Filename :
7011237
Link To Document :
بازگشت