Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Common Hybrid Feature Selection for Modeling Intrusion Detection System and Cyber Attack Detection System

S. Vijayasankari, K. Ramar Published in Network Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450550
Download full text
  1. S Vijayasankari and K Ramar. Article: Common Hybrid Feature Selection for Modeling Intrusion Detection System and Cyber Attack Detection System. International Journal of Applied Information Systems 3(6):16-22, July 2012. BibTeX

    @article{key:article,
    	author = "S. Vijayasankari and K. Ramar",
    	title = "Article: Common Hybrid Feature Selection for Modeling Intrusion Detection System and Cyber Attack Detection System",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 3,
    	number = 6,
    	pages = "16-22",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Intrusion Detection Systems (IDS) and Cyber Attack Detection System (CADS) have to be provided in a Generalised Discriminant Analysis Algorithm. It is an important approach to nonlinear features and extensively used tool for ensuring network security. Complex relationships exist between the features, which are difficult for humans to discover. The conventional Linear Discriminant Analysis feature reduction technique is not suitable for nonlinear data set. Artificial Neural Network and C4. 5 classifiers to result in supervisory algorithm are used. If real-time detection is desired IDS must reduce the amount of data to be processed. Currently IDS examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little to the detection process. The purpose of this research work is to identify important input features in building IDS that is computationally efficient and effective. The performance of two feature selection algorithms involving Bayesian Networks (BN) and Classification and Regression Trees (CART) and an ensemble of BN and CART were investigated. Empirical results indicate that significant input feature selection is important to design IDS with efficient, effective and lightweight for real world detection systems. Finally, hybrid architecture for combining different feature selection algorithms for real world intrusion detection was proposed.

Reference

  1. American computer Emergency response Team / Coordination centre (CERT), http://www. cert. org. , January, 2012.
  2. Kemal Polat, Salih Güne?, and Ahmet Arslan 2008, 'A cascade learning system for classification of diabetes disease: Generalized Discriminant Analysis and Least Square Support Vector Machine', Expert Systems with Applications, Vol. 34, pp. 482-487.
  3. Jing Gao, Haibin Cheng and Pang-ning Tan, 2006 'A novel framework for Incorporating Labeled Example into anomaly detection', Proceedings of the Siam Conference on Data mining
  4. Gopi K, Kuchimanchi, Vir V Phoha, Kiran S Balagani, Shekhar R Gaddam 2004, 'Dimension Reduction Using Feature Extraction Methods for real-time Misuse Detection Systems', Proceedings of the IEEE on Information.
  5. Mukkamala S, Sung A. H. and Abraham A. 2003, Intrusion Detection Using Ensemble of Soft Computing Paradigms, Third International Conference on Intelligent Systems Design and Applications, Springer Verlag Germany, pp. 239-248.
  6. MIT Lincoln Laboratory. http://www. ll. mit. edu/IST/ideval/
  7. Information security report, http://www. isecu-tech. com. tw/. 2012.
  8. KDDCup99dataset, August 2003 http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html
  9. Brieman L. , Friedman J. , Olshen R. and Stone C. 1984, Classification of Regression Trees. Wadsworth Inc.
  10. Lee W. , Stolfo S. and Mok K. 1999, A Data Mining Framework for Building Intrusion Detection Models, In Proceedings of the IEEE Symposium on Security and Privacy.
  11. Nallusamy. R, Jayarajan. K, Duraiswamy. K. 2009, 'Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection', Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No. 5 (22), pp. 28-35.
  12. Chebrolu, S. , A. Abraham, J. Thomas. 2005 , 'Feature deduction and ensemble design of intrusion detection systems', Journal of Computers & Security, Vol-24, pp. 295-307.
  13. Khoshgoftaar T. M, Nath S. V, Zhong S, and Seliya. N. 2005, "Intrusion Detection in Wireless Networks Using Clustering Techniques with Expert Analysis," Proc. Fourth Int'l Conf. Machine Learning and Applications.
  14. A. Boukerche, K. R. L. Juc, J. B. Sobral, and M. S. M. A. Notare. 2004, "An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems," Parallel Computing, Vol. 30, pp. 629-646.
  15. Y. -H. Liu, D. -X. Tian, and D. Wei. 2006, 'A Wireless Intrusion Detection Method Based on Neural Network', Proc. Second IASTED Int'l Conf. Advances in Computer Science and Technology.
  16. W. Zhao, R. Chellappa, and N. Nandhakumar. 1998, "Empirical Performance Analysis of Linear Discriminant Classifiers," Proc. Computer Vision and Pattern Recognition, pp. 164-169.
  17. Baudt. G and Anouar. F. 2000, 'Generalized Discriminant Analysis Using a Kernal Approach,' Neural Computation.
  18. Fukunaga. K. 1990, 'Introduction to Statistical Pattern Classification', Academic Press, San Diego, California, USA.
  19. Quinlan, J. R. 1994, 'C4. 5: Programs for Machine Learning', Machine learning, Vol. 16, pp. 235-240.
  20. Shailendra Singh and Sanjay Silakari. 2009, 'Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System', International Journal of Computer Science and Information Security, Vol. 6, pp. 173-180.

Keywords

Cyber attack, Data mining, Hybrid feature selection, Intrusion detection, Classification