Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision

نویسندگان

  • Ebenezer Popoola
  • Aderemi Oluyinka Adewumi
چکیده

Network intrusion is a critical challenge in information and communication systems amongst other forms of fraud perpetrated over the Internet. Despite the various traditional techniques proposed to prevent this intrusion, the threat persists. These days, intrusion detection systems (IDS) are faced with detecting attacks in large streams of connections due to the sporadic increase in network traffics. Although machine learning (ML) has been introduced in IDS to deal with finding patterns in big data, the irrelevant features in the data tend to degrade both the speed and accuracy of detection of attacks. Also, it increases the computational resource needed during training and testing of IDS models. Therefore, in this paper, we seek to find the optimal feature set using discretized differential evolution (DDE) and C4.5 ML algorithm from NSL-KDD standard intrusion dataset. The result obtained shows a significant improvement in detection accuracy, a reduction in training and testing time using the reduced feature set. The method also buttresses the fact that differential evolution (DE) is not limited to optimization of continuous problems but work well for discrete optimization.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Classification of Intrusion Detection using PSO-SVM and Improved Decision Tree

Intrusion Detection is an efficient way of detecting the abnormal behavior of packets in the network, Although in data mining there are various effective decision tree based algorithms are implemented for the classification and detection of Intrusions in KDDCup99 Dataset. Here an efficient technique is implemented for the classification and detection of Intrusions in KDDCup99 Dataset using Feat...

متن کامل

Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering

Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...

متن کامل

Feature Selection for Intrusion Detection using NSL-KDD

These days, network traffic is increasing due to the increasing use of smart devices and the Internet. Amount of the intrusion detection studies focused on feature selection or reduction because some of the features are irrelevant and redundant which results lengthy detection process and degrades the performance of an intrusion detection system (IDS). The purpose of this study is to identify im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017