International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 6, June 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Performance Analysis Of Different Feature Selection Methods In Intrusion Detection

[Full Text]



Megha Aggarwal, Amrita



Index Terms: Intrusion Detection, Comparative Analysis, KDDCup99 dataset, Feature Selection



Abstract: In today’s era detection of security threats that are commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Highly confidential data of various organizations are present over the network so in order to preserve that data from unauthorized users or attackers a strong security framework is required. Intrusion detection system plays a major role in providing security to computer networks. An Intrusion detection system collects and analyzes information from different areas within a computer or a network to identify possible security threats that include threats from both outside as well as inside the organization. The Intrusion detection system deals with large amount of data whichcontains various irrelevant and redundant features resulting in increased processing time and low detection rate. Therefore feature selection plays an important role in intrusion detection. There arevarious feature selection methods proposed in literature by different authors. In this paper a comparative analysis of different feature selection methods are presented on KDDCUP’99 benchmark dataset and their performance are evaluated in terms of detection rate, root mean square error and computational time.



[1]. Anderson, James P., “Computer Security Threat Monitoring and Surveillance”, James P. Anderson Co., Fort Washington, Pa., 1980.

[2]. Denning, D. E. (1987), “An intrusion detection model. IEEE Transaction on SoftwareEngineering”, Software Engineering 13(2), 222-232.

[3]. Denning, D. E. (1987). An intrusion detection model. IEEE Transaction on Software Engineering, Software Engineering 13(2), 222-232.

[4]. Wu, S.X. &Banzhaf, W. (2010). The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing Journal, 10, 1–35.

[5]. Lazarevic, A., Ertoz, L., Kumar V., Ozgur A. &Srivastava J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. In Proc. of the SIAM Conference on Data Mining.

[6]. Kumar, S. &Spafford, E. H. (1994). A pattern matching model for misuse intrusion detection.In Proceedings of the 17th National Computer Security Conference, 11-21.

[7]. sKDD Cup 1999 Intrusion detection dataset: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

[8]. Mukkamala, S. et al. (2005). Intrusion detection using an ensemble of intelligent paradigms.Journal of Network and Computer Applications, 28(2), 167–82.

[9]. Lewis, P. M. (1962). The characteristic selection problem in recognition system. IRE Transaction on Information Theory, 8, 171-178.

[10]. John, G.H. et al. (1994). Irrelevant Features and the Subset Selection Problem. Proc. of the 11thInt. Conf. on Machine Learning, Morgan Kaufmann Publishers, 121-129

[11]. Dash, M. & Liu, H. (1997). Feature Selection for Classification. Intelligent Data Analysis, 1(3), 131–56
[12]. Blum, Avrim L. & Pat Langley (1997). Selection of relevant features and examples in machinelearning. Artificial Intelligence, 97(1-2), 245–271

[13]. Liu, H. & Yu, L. (2005).Towards integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering, 17(4), 491-502

[14]. Das, S. (2001). Filters, Wrappers and a Boosting-Based Hybrid for Feature Selection. Proc. 18thInt’l Conf. Machine Learning, 74-81

[15]. Liu, H. & Yu, L. (2005). Towards integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering, 17(4), 491-502

[16]. R. Kohavi and G.H. John (1997).Wrappers for Feature Subset Selection.Artificial Intelligence.97 (1-2), 273-324

[17]. Xing, E. et al. (2001). Feature Selection for High-Dimensional Genomic Microarray Data. Proc. 15th Int’l Conf.Machine Learning, 601-608

[18]. Gong, S. (2011),” Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction”, International Conference on Multimedia Technology (ICMT), 6365 – 6368.

[19]. Nyguen, H. and Franke, K. et al.(2010)”Improving effectiveness of intrusion detection by correlation feature selection”, International conference on availability, reliability and security, 17-24.

[20]. Xing, E. et al. (2001)”Feature Selection for High-Dimensional Genomic Microarray Data”, Proc.15th Int’l Conf.Machine Learning, 601-608.

[21]. Sridevi,R. and Chattemvelli ,R.(2012) “Genetic algorithm and Artificial immune systems: A combinational approach for network intrusion detection ”,International conference on advances in engineering, science and management (ICAESM-2012),494-498.

[22]. http://weka.sourceforge.net/doc.dev/weka/attributeSelection.