Experimental analysis of data mining application for intrusion detection with feature reduction

Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin
{"title":"Experimental analysis of data mining application for intrusion detection with feature reduction","authors":"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin","doi":"10.1109/ECACE.2017.7912907","DOIUrl":null,"url":null,"abstract":"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECACE.2017.7912907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
数据挖掘在特征约简入侵检测中的应用实验分析
随着互联网信息的巨大增长,网络安全的重要性也急剧增加。基于网络的入侵检测系统和基于主机的入侵检测系统是网络安全基础设施中的两个主要系统。当网络或主机中出现新的入侵类型时,检测这些新的入侵也会出现一些严重的问题。因此,入侵防御者需要比基于签名的检测更好的检测方法。入侵行为用一些特征来表示,并从这些不确定特征特征中收集相应的特征数据。近二十年来,人们开发了几种利用这些数据作为人工标记来检测入侵的技术,这是一个非常耗时和昂贵的过程。本文提出了一种基于数据挖掘规则的决策表(DT)算法来检测入侵,并提出了一种新的特征选择过程来同时去除无关/相关的特征。利用本文提出的存在特征选择技术和DT分类算法对KDD'99 cup数据集进行了实证分析。实验结果表明,在所有情况下,与贝叶斯网络、Naïve贝叶斯分类器和其他开发的数据挖掘KDD'99 cup挑战算法相比,该方法在准确率和成本上都有更好的表现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new approach of noise elimination methodology for ECG signal Modeling of grid connected battery storage wave energy and PV hybrid renewable power generation Automated anti-collision system for automobiles A TDMA based EM controlled multi-channel MAC protocol for underwater sensor networks Performance analysis of classifying localization sites of protein using data mining techniques and artificial neural networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1