An Efficient Classifier approaches for Feature Reduction in Intrusion Detection

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-26 Number-1
Year of Publication : 2015
Authors : B.V. Ramnaresh Yadav, B. Satya Narayana, D. Vasumati


B.V. Ramnaresh Yadav, B. Satya Narayana, D. Vasumati "An Efficient Classifier approaches for Feature Reduction in Intrusion Detection". International Journal of Computer Trends and Technology (IJCTT) V26(1):37-44, August 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Data security is primary concern in all service providing systems. Intrusion detection system is being popularly used for safeguard the data. But, traditional intrusion detection systems are based on derived knowledge of signature of known attacks which limit the scope of intrusion detection. The wide use of internet and its services in today life make high dependency over computer network and Web services systems. The dependency demands for a high network security for the exchange of confidential and secure information over the network communication channel. A secure information exchange can be made through deploying efficient intrusion detection for protection from various network attacks. Today most of the intrusion detection approaches focused on the issues of feature selection or reduction, since some of the features are irrelevant and redundant which results lengthy detection process and degrades the performance of an intrusion detection system (IDS). In this paper We analyze three feature reduction approaches to evaluate the accuracy of classification using NSL-KDD dataset.

[1] M. Tavallaee, E. Bagheri, W. Lu and A.Ghorbani, ―A Detailed Analysis of the KDD CUP 99 Data Set, Submitted to 2nd IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.
[2] D. Ndumiyana, R. Gotora and H. Chikwiriro, ―Data Mining Techniques in Intrusion Detection: Tightening Network Security, International Journal of Engineering Research & Technology, Vol. 2 Issue 5, May, 2013
[3] H. Tribak , Blanca L.,, ― Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System, IEEE, 2012
[4] S. Thaseen and Ch. Aswani K, ―An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System, International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), IEEE, February 21-22 2013
[5] M K. Asif, Talha A. K, et. al.,, ― Network Intrusion Detection and its Strategic Importance, Business Engineering and Industrial Applications Colloquium(BEIAC), IEEE, 2013
[6] R. Kohavi, ―Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid, ser. Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. AAAI Press, 1996, pp. 202–207.
[7] Zubair A. B, A S. Shaheen, and Radwan A, ―An AODE-based Intrusion Detection System for Computer Networks, pp. 28– 35, IEEE 2011.
[8] Panda M. and M R Patra, ―A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection, First International Conference on Emerging Trends in Engineering and Technology, pp 504-507, IEEE, 2008
[9] H Nguyen, K Franke and S Petrovi’c, ―Improving Effectiveness of Intrusion Detection by Correlation Feature Selection, International Conference on Availability, Reliability and Security, pp. 17–24, IEEE 2010.
[10] Meng J, S Haikun, ―The application on intrusion detection based on K-Means cluster algorithm, International Forum on Information Technology and Application, 2009
[11] Mohammadreza E, Sara M, Fatimah S, L S Affendey, ―Intrusion Detection Using Data Mining Techniques, Proceedings Of IEEE International Conference on Information Retrieval & Knowledge Management,Exploring Invisible World, CAMP’10, pp.200-203,2010.
[12] Y. Li u, X. Yu, J.X. Huang, A. An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets, Information Processing &Management 47-617– 631,2011
[13] S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.- L. Lai, C.D. Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines, Expert Systems with Applications,38-306–313.,2011
[14] Q. Zhang, G. Hu and W. Feng, ―Design and performance evaluation of a machine learning-based method for intrusion detection, in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing, in: Studies in Computational Intelligence, vol. 295, Springer,pp. 69–83. 2010.
[15] J Zhang and M. Zulkernine, ―Anomaly based Network Intrusion detection with unsupervised outlier detection, School of Computing Queen’s University, Kingston, Ontario, Canada. IEEE International Conference ICC 2006, Volume-9, pp. 2388-2393, 11-15 June 2006.
[16] K Wankhade, S Patka and R Thools, "An Efficient Approach for Intrusion Detection Using Data Mining Methods", IEEE 2013.
[17] R Chitrakar and H Chuanhe, ―Anomaly Detection using Support Vector Machine Classification with k-Medoids Clustering, IEEE, 2012
[18] Gary S, B Chen,― Decision Tree Classifier for network intrusion detection with GA based feature selection, University of Central Florida. ACM-SE 43, Proceedings of 43rd annual southeast regional Conference. Volume-2, ACM, 2005.
[19] Cuixiao Z, G Zhang, Shanshan S., ―A mixed unsupervised clustering based Intrusion detection model, Third International Conference on Genetic and Evolutionary Computing, 2009
[20] ―Knowledge Discovery in Databases DARPA archive. Task Description, KDDCUP-1999 DataSet, [21] NSL-KDD data set for network based intrusion detection systems. Available on:, March 2009.
[22] Fatin N, Mohd Sabri, Norita Md Norwawi and K Seman, ―Hybrid of Rough Set Theory and Artificial Immune Recognition System as a Solution to Decrease False Alarm Rate in Intrusion Detection System, IEEE 2011
[23] Z.Muda, W Yassin, M.N. Sulaiman and N.I. Udzir, ―Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification 7th IEEE International Conference on IT in Asia , 2011.
[24] Shailendra singh etal Improved Support Vector Machine for Cyber Attack DetectionConference Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA
[25] B.V.ramnaresh Yadav, B Satyanarayana, D.vasumathi ―A Feature Covariance Deviation Method for Feature Reduction in Intrusion etection Internataional onference on Computers, Datamining and Mechanical engineering, IIENG ,Bangkok 2015.
[26] S Mukherjee Feature Vitality Based Reduction Method (FVBRM) in the proceedings of International journal of advanced research in computer science and software engineering