Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Hybrid Feature Selection for Modeling Intrusion Detection Systems

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 3316))

Included in the following conference series:

  • 173Accesses

  • 20Citations

Abstract

Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything) to the detection process. We investigated the performance of two feature selection algorithms involving Bayesian Networks (BN) and Classification and Regression Trees (CART) and an ensemble of BN and CART. An hybrid architecture is further proposed by combining different feature selection algorithms. Empirical results indicate that significant input feature selection is important to design an IDS that is lightweight, efficient and effective for real world detection systems.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Brieman, L., Friedman, J., Olshen, R., Stone, C.: Classification of Regression Trees. Wadsworth Inc. (1984)

    Google Scholar 

  2. Cheng, J., Greiner, R., Kelly, J., Bell, D.A., Liu, W.: Learning Bayesian Networks from Data: an Information-Theory Based Approach. The Artificial Intelligence Journal 137, 43–90 (2002)

    Article MATH MathSciNet  Google Scholar 

  3. KDD cup 99 Intrusion detection data set,http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz

  4. Lee, W., Stolfo, S., Mok, K.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the IEEE Symposium on Security and Privacy (1999)

    Google Scholar 

  5. Luo, J., Bridges, S.M.: Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection. International Journal of Intelligent Systems 15(8), 687–704 (2000)

    Article MATH  Google Scholar 

  6. MIT Lincoln Laboratory,http://www.ll.mit.edu/IST/ideval/

  7. Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion Detection Using Ensemble of Soft Computing Paradigms. In: Third International Conference on Intelligent Systems Design and Applications, pp. 239–248. Springer, Germany (2003)

    Google Scholar 

  8. Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: Proceedings of International Symposium on Applications and the Internet (SAINT 2003), pp. 209–217 (2003)

    Google Scholar 

  9. Tsamardinos, I., Aliferis, C.F., Statnikov, A.: Time and Sample Efficient Discovery of Markov Blankets and Direct Causal Relations. In: 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, USA, pp. 673–678. ACM Press, New York (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Oklahoma State University, USA

    Srilatha Chebrolu, Ajith Abraham & Johnson P. Thomas

Authors
  1. Srilatha Chebrolu
  2. Ajith Abraham
  3. Johnson P. Thomas

Editor information

Editors and Affiliations

  1. Indian Statistical Institute, Electronics and Communication Sciences Unit, Kolkata, India

    Nikhil Ranjan Pal

  2. School of Computer and Information Sciences, Knowledge Engineering and Discovery Research Institute (KEDRI), Auckland University of Technology, Private Bag 92006, Auckland, New Zealand

    Nik Kasabov

  3. Department of Instrumentation and Electronics Engineering, Jadavpur University, Salt-lake Campus, 700098, Calcutta, India

    Rajani K. Mudi

  4. Indian Statistical Institute, 203 B. T. Road, 700 108, Calcutta,  

    Srimanta Pal

  5. Indian Statistical Institute, Computer Vision and Pattern Recognition Unit, 700108, Kolkata, India

    Swapan Kumar Parui

Rights and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chebrolu, S., Abraham, A., Thomas, J.P. (2004). Hybrid Feature Selection for Modeling Intrusion Detection Systems. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds) Neural Information Processing. ICONIP 2004. Lecture Notes in Computer Science, vol 3316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30499-9_158

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp