Title :
Relevance feature selection with data cleaning for intrusion detection system
Author :
Suthaharan, Shan ; Panchagnula, Tejaswi
Author_Institution :
Dept. of Comput. Sci., Univ. of North Carolina at Greensboro, Greensboro, NC, USA
Abstract :
Labeled datasets play a major role in the process of validating and evaluating machine learning techniques in intrusion detection systems. In order to obtain good accuracy in the evaluation, very large datasets should be considered. Intrusion traffic and normal traffic are in general dependent on a large number of network characteristics called features. However not all of these features contribute to the traffic characteristics. Therefore, eliminating the non-contributing features from the datasets, to facilitate speed and accuracy to the evaluation of machine learning techniques, becomes an important requirement. In this paper we suggest an approach which analyzes the intrusion datasets, evaluates the features for its relevance to a specific attack, determines the level of contribution of feature, and eliminates it from the dataset automatically. We adopt the Rough Set Theory (RST) based approach and select relevance features using multidimensional scatter-plot automatically. A pair-wise feature selection process is adopted to simplify. In our previous research we used KDD´99 dataset and validated the RST based approach. There are lots of redundant data entries in KDD´99 and thus the machine learning techniques are biased towards most occurring events. This property leads the algorithms to ignore less frequent events which can be more harmful than most occurring events. False positives are another important drawback in KDD´99 dataset. In this paper, we adopt NSL-KDD dataset (an improved version of KDD´99 dataset) and validate the automated RST based approach. The approach presented in this paper leads to a selection of most relevance features and we expect that the intrusion detection research using KDD´99-based datasets will benefit from the good understanding of network features and their influences to attacks.
Keywords :
feature extraction; learning (artificial intelligence); rough set theory; security of data; KDD´99-based datasets; NSL-KDD dataset; automated RST based approach; data cleaning; intrusion detection system; intrusion traffic; machine learning technique; multidimensional scatter-plot; network characteristics; network features; noncontributing feature; pairwise feature selection process; redundant data entries; relevance feature selection; rough set theory; Approximation methods; Cleaning; Feature extraction; Gaussian distribution; Internet; Intrusion detection; Machine learning; NSL-KDD dataset; Rough Set Theory; intrusion detection; labeled datasets; relevance feature selection;
Conference_Titel :
Southeastcon, 2012 Proceedings of IEEE
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-1374-2
DOI :
10.1109/SECon.2012.6196965