An Efficient Feature Selection Approach for Intrusion Detection System using Decision Tree
The intrusion detection system has been widely studied and deployed by researchers for providing better security to computer networks. The increasing volume of attacks, com-bined with the rapid improvement of machine learning (ML) has made the collaboration of intrusion detection techniques with mac...
Saved in:
Published in | International journal of advanced computer science & applications Vol. 13; no. 2 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
West Yorkshire
Science and Information (SAI) Organization Limited
01.01.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The intrusion detection system has been widely studied and deployed by researchers for providing better security to computer networks. The increasing volume of attacks, com-bined with the rapid improvement of machine learning (ML) has made the collaboration of intrusion detection techniques with machine learning and deep learnings are a popular subject and a feasible approach for cyber threat protection. Machine learning usually involves the training process using huge sample data. Since the huge input data may cause a negative effect on the training and detection performance of the machine learning model, feature selection becomes a crucial technique to rule out the irrelevant and redundant features from the dataset. This study applied a feature selection approach for intrusion detection that incorporated state-of-the-art feature selection algorithms with attack characteristic feature to produce an optimized set of features for the machine learning algorithms, which was then used to train the machine learning model. CSECIC- IDS2018 dataset, the most recent benchmark dataset with a wide attack diversity and features have been used to create the efficient feature subset. The result of the experiment was produced using machine learning models with a decision tree classifier and analyzed with respect to the accuracy, precision, recall, and f1 score. |
---|---|
AbstractList | The intrusion detection system has been widely studied and deployed by researchers for providing better security to computer networks. The increasing volume of attacks, com-bined with the rapid improvement of machine learning (ML) has made the collaboration of intrusion detection techniques with machine learning and deep learnings are a popular subject and a feasible approach for cyber threat protection. Machine learning usually involves the training process using huge sample data. Since the huge input data may cause a negative effect on the training and detection performance of the machine learning model, feature selection becomes a crucial technique to rule out the irrelevant and redundant features from the dataset. This study applied a feature selection approach for intrusion detection that incorporated state-of-the-art feature selection algorithms with attack characteristic feature to produce an optimized set of features for the machine learning algorithms, which was then used to train the machine learning model. CSECIC- IDS2018 dataset, the most recent benchmark dataset with a wide attack diversity and features have been used to create the efficient feature subset. The result of the experiment was produced using machine learning models with a decision tree classifier and analyzed with respect to the accuracy, precision, recall, and f1 score. |
Author | Das, Abhijit Pramod S, Sunitha B |
Author_xml | – sequence: 1 givenname: Abhijit surname: Das fullname: Das, Abhijit – sequence: 2 givenname: Pramod surname: - fullname: -, Pramod – sequence: 3 givenname: Sunitha B surname: S fullname: S, Sunitha B |
BookMark | eNp9UE1PAjEQbQwmIvIPPGziebEf293W2wZFMSQewMR4abplqkugi2058O8tHycPzmUmb96bj3eNeq5zgNAtwSNS8FLeT1_r8bweUUzpCBOGaVVeoD4lvMw5r3DvWIuc4OrjCg1DWOEUTNJSsD76rF32ZG1rWnAxm4COOw_ZHNZgYtu5rN5ufafNd2Y7n01d9LtwgB8hngnzfYiwyRLsvhJs2mN_4QFu0KXV6wDDcx6g98nTYvySz96ep-N6lhvKecwt2EZUghfLZql1SZiVBBpji0oSbRqpRcEJaVJRgeFGispgttQYZGmpkJYN0N1pbrr0ZwchqlW38y6tVLTkVDIsBUushxPL-C4ED1aZNurDC9Hrdq0IVkc71clOdbBTne1M4uKPeOvbjfb7_2W_eK57rg |
CitedBy_id | crossref_primary_10_3390_app12178601 |
ContentType | Journal Article |
Copyright | 2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 3V. 7XB 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- M2O MBDVC P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
DOI | 10.14569/IJACSA.2022.0130276 |
DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials - QC ProQuest Central Technology Collection ProQuest One ProQuest Central Korea ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Research Library (ProQuest) Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef Publicly Available Content Database Research Library Prep Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2156-5570 |
ExternalDocumentID | 10_14569_IJACSA_2022_0130276 |
GroupedDBID | .DC 5VS 8G5 AAYXX ABUWG ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CCPQU CITATION DWQXO EBS EJD GNUQQ GUQSH HCIFZ K7- KQ8 M2O OK1 PHGZM PHGZT PIMPY RNS 3V. 7XB 8FE 8FG 8FK JQ2 MBDVC P62 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c255t-fefb87854dbdaa613f91ebcf4791acb9a84511bb9a7ec5c987c03da0e96f289f3 |
IEDL.DBID | BENPR |
ISSN | 2158-107X |
IngestDate | Fri Jul 25 02:34:17 EDT 2025 Tue Jul 01 01:10:08 EDT 2025 Thu Apr 24 23:12:36 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c255t-fefb87854dbdaa613f91ebcf4791acb9a84511bb9a7ec5c987c03da0e96f289f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://www.proquest.com/docview/2652930983?pq-origsite=%requestingapplication% |
PQID | 2652930983 |
PQPubID | 5444811 |
ParticipantIDs | proquest_journals_2652930983 crossref_citationtrail_10_14569_IJACSA_2022_0130276 crossref_primary_10_14569_IJACSA_2022_0130276 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20220101 |
PublicationDateYYYYMMDD | 2022-01-01 |
PublicationDate_xml | – month: 01 year: 2022 text: 20220101 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | West Yorkshire |
PublicationPlace_xml | – name: West Yorkshire |
PublicationTitle | International journal of advanced computer science & applications |
PublicationYear | 2022 |
Publisher | Science and Information (SAI) Organization Limited |
Publisher_xml | – name: Science and Information (SAI) Organization Limited |
SSID | ssj0000392683 |
Score | 2.1978648 |
Snippet | The intrusion detection system has been widely studied and deployed by researchers for providing better security to computer networks. The increasing volume of... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
SubjectTerms | Algorithms Computer networks Datasets Decision analysis Decision trees Feature selection Intrusion detection systems Machine learning Training |
Title | An Efficient Feature Selection Approach for Intrusion Detection System using Decision Tree |
URI | https://www.proquest.com/docview/2652930983 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1NT8IwGG4ELl78NqJIevA62dZ1W09mIggkEiOQEC9L23VezEDA_-_7bgXDRW9L1-3wtH2_2j4PIXeuzJnADXcZa-4EXHuO1L52NOPK8zLPZRIvOL-Mw8EsGM353Bbc1vZY5dYmloY6W2iskXf8kINnckXMHpZfDqpG4e6qldCokQaY4BiSr8Zjb_z6tquyuOD-w5KLE1wb8phGc3t_DgIH0RmOku4kgSzR9--rLbxw3z_tm-fS5_RPyJENFmlSje4pOTDFGTneCjFQuy7PyXtS0F7JBQEuhGJU970ydFJK3ADuNLHE4RQiVDos8J4FNj-Zje1Q8ZZTPAT_Ac2V7A6droy5ILN-b9odOFY0wdGQHWyc3OQqjmIeZCqTEpx1LjyjdB5EwpNaCRkjI5mCh8horkUcaZdl0jUizCH5ytklqReLwlwRyuGNiJCUS6lAG64gmIQIJWMylNqEuknYFqpUW0ZxFLb4TDGzQIDTCuAUAU4twE3i7L5aVowa__RvbUchtetrnf7Ohuu_X9-QQ_xZVTRpkTogbG4hjNioNqnF_ee2nTE_OKbFvg |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T8QwDLZ4DLDwRhzPDDAW2qZpmwGhCjjueC0c0omlJGnKgsrrEOJP8Rux2xTEAhNblaQZHCf-HMefAbZ9VXJJAXeVGuFFwgSeMqHxDBc6CIrA54oSnC8u4951dDoUwzH4aHNh6FlleybWB3XxYOiOfC-MBVomX6b84PHJo6pRFF1tS2g0anFm39_QZXvZ7x_h-u6EYfd4cNjzXFUBzyB8HnmlLXWapCIqdKEUWrNSBlabMkpkoIyWKiXKLo0fiTXCoE9ufF4o38q4RO-k5DjvOExGnEvaUWn35OtOx0ewEdfMn2hIiTU1GbpsPYQpcq9_mh1eZeiThuFuEzCMf1rDn8agtnDdOZhx0JRljS7Nw5itFmC2LfvA3CmwCDdZxY5r5gk0WIww5OuzZVd1QR1cZZY5mnKGeJj1K8rqoOYjO3IDGpZ0Rk_u77C5KfLDBs_WLsH1vwhzGSaqh8quABPYIxOiANM6MlZohK6IhwquYmVsbDrAW1HlxvGXUxmN-5z8GBJw3gg4JwHnTsAd8L7-emz4O_4Yv96uQu5280v-rXurv3dvwVRvcHGen_cvz9ZgmiZurmvWYQKlbTcQwIz0Zq01DG7_W00_AZgmAps |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient+Feature+Selection+Approach+for+Intrusion+Detection+System+using+Decision+Tree&rft.jtitle=International+journal+of+advanced+computer+science+%26+applications&rft.au=Das%2C+Abhijit&rft.au=Pramod&rft.au=Sunitha%2C+B+S&rft.date=2022-01-01&rft.pub=Science+and+Information+%28SAI%29+Organization+Limited&rft.issn=2158-107X&rft.eissn=2156-5570&rft.volume=13&rft.issue=2&rft_id=info:doi/10.14569%2FIJACSA.2022.0130276 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-107X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-107X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-107X&client=summon |