Iterative Per Group Feature Selection For Intrusion Detection
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However,...
Saved in:
Published in | International Wireless Communications and Mobile Computing Conference (Online) pp. 708 - 713 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However, high dimensional data sets are a significant challenge for machine learning. In fact, learning algorithms considering all features in the input data, may cause over-fitting to irrelevant aspects of the data and increase the computational time caused by the process of similar features that provide redundant information, which is a critical problem especially for users with constrained resources. In this paper, we propose a new and efficient feature selection technique for intrusion detection in modern networks called Iterative Per Group Feature Selection (IPGFS). IPGFS reduces the number of features in the input data and selects the best features using the performance accuracy of the classifier. The features are sorted and selected according to their accuracy score. Both the UNSW and NSLKDD datasets are used in this paper to validate the proposed model and verify its efficiency in detecting intrusions. The simulation results show that the proposed model can reduce the number of features for the two dataset while successfully detecting intrusions with better accuracy compared to state-of-the-art techniques. Index Cloud security, feature selection, accuracy, machine learning techniques. |
---|---|
AbstractList | Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However, high dimensional data sets are a significant challenge for machine learning. In fact, learning algorithms considering all features in the input data, may cause over-fitting to irrelevant aspects of the data and increase the computational time caused by the process of similar features that provide redundant information, which is a critical problem especially for users with constrained resources. In this paper, we propose a new and efficient feature selection technique for intrusion detection in modern networks called Iterative Per Group Feature Selection (IPGFS). IPGFS reduces the number of features in the input data and selects the best features using the performance accuracy of the classifier. The features are sorted and selected according to their accuracy score. Both the UNSW and NSLKDD datasets are used in this paper to validate the proposed model and verify its efficiency in detecting intrusions. The simulation results show that the proposed model can reduce the number of features for the two dataset while successfully detecting intrusions with better accuracy compared to state-of-the-art techniques. Index Cloud security, feature selection, accuracy, machine learning techniques. |
Author | Mohamed, Amr Hamila, Ridha Guizani, Mohsen Gouissem, Ala Chkirbene, Zina Erbad, Aiman Hamdi, Mounir |
Author_xml | – sequence: 1 givenname: Zina surname: Chkirbene fullname: Chkirbene, Zina organization: College of Engineering, Qatar University – sequence: 2 givenname: Aiman surname: Erbad fullname: Erbad, Aiman organization: College of Engineering, Qatar University – sequence: 3 givenname: Ridha surname: Hamila fullname: Hamila, Ridha organization: College of Engineering, Qatar University – sequence: 4 givenname: Ala surname: Gouissem fullname: Gouissem, Ala organization: College of Engineering, Qatar University – sequence: 5 givenname: Amr surname: Mohamed fullname: Mohamed, Amr organization: College of Engineering, Qatar University – sequence: 6 givenname: Mohsen surname: Guizani fullname: Guizani, Mohsen organization: College of Engineering, Qatar University – sequence: 7 givenname: Mounir surname: Hamdi fullname: Hamdi, Mounir organization: College of Science, Engineering and Technology, HBK University,Qatar |
BookMark | eNotj0FLw0AUhFdRsK39BR7MH0h8b3ezmz14kNjUQEVBxWN5SV4gUpOy2Qj-ey3taZjhY5iZi4t-6FmIW4QEEdxd-Zk_5zpDsIkECYlDnYGxZ2KOVmaoUDp9LmZSWRObFMyVWI7jFwAoif-Enon7MrCn0P1w9Mo-Wvth2kcFU5g8R2-84zp0Qx8Vg4_KPvhpPLhHDsf8Wly2tBt5edKF-ChW7_lTvHlZl_nDJu4kqBA7TbaqqNUoSaomtQYByTU1KU6RUgtQqUpmiqiutWub7LBQO9O4yhlWaiFujr0dM2_3vvsm_7s9vVV_5qRLEg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IWCMC48107.2020.9148067 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1728131294 9781728131290 |
EISSN | 2376-6506 |
EndPage | 713 |
ExternalDocumentID | 9148067 |
Genre | orig-research |
GroupedDBID | 6IE 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i203t-94a7bbaf412a23d576101a9dca3e51a5700b3b283aacc49fd80032496d9b96e33 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:30:40 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-94a7bbaf412a23d576101a9dca3e51a5700b3b283aacc49fd80032496d9b96e33 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9148067 |
PublicationCentury | 2000 |
PublicationDate | 2020-June |
PublicationDateYYYYMMDD | 2020-06-01 |
PublicationDate_xml | – month: 06 year: 2020 text: 2020-June |
PublicationDecade | 2020 |
PublicationTitle | International Wireless Communications and Mobile Computing Conference (Online) |
PublicationTitleAbbrev | IWCMC |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003211724 |
Score | 2.130547 |
Snippet | Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 708 |
SubjectTerms | Computational modeling Feature extraction Intrusion detection Machine learning Machine learning algorithms Testing Training |
Title | Iterative Per Group Feature Selection For Intrusion Detection |
URI | https://ieeexplore.ieee.org/document/9148067 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvTioxXf7MGjSdPdTdI9eKqWVqgUtNhb2ccEREglpBd_vbNJrA88eEsWQpIZduab2W9mAK64B6GZof1N7i6QUmNgIuMJNi6LNTdkH31x8uwhmSzk_TJetuB6WwuDiBX5DEN_WZ3lu7Xd-FRZXxF2J-vahjYFbnWt1jafIiiSSblsKFyDSPWnz6PZSA4pvqEwkEdh8_SPMSqVFxnvwezz_TV55DXclCa0779aM_73A_eh91Wvx-ZbT3QALcwPYfdbq8Eu3Eyr9slk29gcC1alnJjHf5sC2WM1DIc0xMbrgk1zX4jh726xrNd7sBjfPY0mQTM6IXjhkSgDJXVqjM7kgGsuHAUVtPW0clYLjAfaN7U3whC00NpaqTI39BKUKnHKqASFOIJOvs7xGBgmBFGcURjFKIVLTSaciqSVwlouTXoCXS-I1VvdHWPVyOD07-Uz2PHKqMlW59ChH8ILcuuluaz0-QGVbqFo |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKGYCFR4t444GRhNR2knpgKlQNNFUlWtGt8uMiIaQUVenCr-echPIQA1tiyZJzJ98r931HyBVzQWim8X6ju_OEUODpQLsGG5uFimm0jw6cnI6iwVQ8zMJZg1yvsTAAUDafge8ey3_5dmFWrlR2IzF2R-u6QTbR74edCq21rqhwzGViJuomrk4gb5LnXtoTXcxwMBFkgV_v_zFIpfQj_V2Sfp6gah959VeF9s37L3LG_x5xj7S_EHt0vPZF-6QB-QHZ-UY22CK3SUmgjNaNjmFJy6ITdRHgagn0qRyHgzqi_cWSJrmDYri3Oyiq9TaZ9u8nvYFXD0_wXljAC08KFWutMtFhinGLaQVePiWtURzCjnK09pprDC6UMkbIzHadBIWMrNQyAs4PSTNf5HBEKEQYpFgtIQhBcBvrjFsZCCO4MUzo-Ji0nCDmbxU_xryWwcnfy5dkazBJh_NhMno8JdtOMVXr1Rlp4sfBOTr5Ql-Uuv0ANBmksQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=International+Wireless+Communications+and+Mobile+Computing+Conference+%28Online%29&rft.atitle=Iterative+Per+Group+Feature+Selection+For+Intrusion+Detection&rft.au=Chkirbene%2C+Zina&rft.au=Erbad%2C+Aiman&rft.au=Hamila%2C+Ridha&rft.au=Gouissem%2C+Ala&rft.date=2020-06-01&rft.pub=IEEE&rft.eissn=2376-6506&rft.spage=708&rft.epage=713&rft_id=info:doi/10.1109%2FIWCMC48107.2020.9148067&rft.externalDocID=9148067 |