Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Novel Feature Reduction Technique for Detection of DoS Attack on Dataset
Author(s):
1. Supriya Dicholkar: Doctor, K. J. Somaiya College of Engineering,Vidyavihar,India
2. Jagannath Nirmal: Somaiya College of Engineering, Vidyavihar, India
Abstract:
The big datasets with numerous features characterizing network traffic parameters are used when creating an Intrusion Detection System (IDS) for machine learning-based IoT attack detection, Thus, one crucial stage in the dataset preprocessing procedure is feature reduction, as datasets with larger feature sets required more computation, storage, and processing time. The current work suggests a filter-based feature reduction technique that aggregates features selected from correlation (CR), relief factor (ReF), and information gain ratio (IGR). Initially, we select a feature subset from the CIE-CICIDS2018 dataset by applying all the above techniques using the average weight threshold. Then further feature optimization is carried out with a novel proposed subset aggregate strategy (SAS). The proposed SAS feature reduction method with three variants (SAS1, SAS2, and SAS3) efficiently selects common features from three feature subsets formed with three feature reduction techniques. With the SAS strategy, only 57, 27, and 4 features are selected out of a total of 78 features in the CIC-IDS2018 dataset, respectively. Following the feature set reduction, a rule-based PART classifier is used. When metrics like accuracy, precision, recall, and model-building time are compared to the performance of state-of-the-art systems, the proposed novel method outperforms them.
Page(s): 1-100
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 3, Year: 2024
Keywords:
Feature selection , Internet of Things , Classification algorithms , Intrusion Detection , Pattern Analysis
References:
[1] Dicholkar S. V.,Sekhar D.,Review-IoT Security D.,Vadis D. .2020 .. , 9318641 : .
[2] Siddiqi M. A.,Pak W.,Dec W. .2020 .Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System,” Electronics. , 9(12) : 2114.
[3] Sen R.,Goswami S.,Mandal A. K.,Chakraborty B. .2022 .An effective feature subset selection approach based on Jeffries-Matusita distance for multiclass problems. ” Journal of Intelligent & Fuzzy Systems, 42(4) : 4173-4190.
[4] Sharma B.,Sharma L.,Lal C.,Roy S.,Apr S. .2023 .Anomaly based network intrusion detection for IoT attacks using deep learning technique,” Computers and Electrical Engineering. , 108626 : 108626.
[5] Mohammadi S.,Mirvaziri H.,Ghazizadeh-Ahsaee M.,Karimipour H. .2018 .Cyber intrusion detection by combined feature selection algorithm. ” Journal of Information Security and Applications, 11 : 80-88.
[6] Gupta N.,Jindal V.,Bedi P.,Jan P. .2021 .CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. ” Computers & Security, 102499 : 102499.
[7] Taher K. A.,B. K. A.,Rahman Md. M. .2019 .Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection. Electrical and Signal Processing Techniques (ICREST), 8644161 : .
[8] Leevy J. L.,Hancock J.,Zuech R.,Khoshgoftaar T. M.,Feb T. M. .2021 .Detecting cybersecurity attacks across different network features and learners. ” Journal of Big Data, 8(1) : .
[9] T.-C. Vuong H.,Tran M. X.,Trang M. X.,-D. Ngo T. V.,Luong T. V. .2022 .A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 9979923 : .
[10] Sharma M.,Elmiligi H.,Gebali F. .2021 .A Novel Intrusion Detection System for RPL-Based Cyber-Physical Systems,”. IEEE Canadian Journal of Electrical and Computer Engineering, 3053231(2) : 246-252.
[11] Desai R. .2023 .Network Intrusion Detection Through Machine Learning With Efficient Feature Selection,” 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS. , 10041315 : .
[12] Chandra A.,Khatri S. K.,Simon R. .2019 .Filter-based Attribute Selection Approach for Intrusion Detection using k-Means Clustering and Sequential Minimal Optimization Techniq. 2019 Amity International Conference on Artificial Intelligence (AICAI), 8701373 : .
[13] Zuech R.,Hancock J.,Khoshgoftaar T. M.,Dec T. M. .2022 .A new feature popularity framework for detecting cyberattacks using popular features. ” Journal of Big Data, 9(1) : .
[14] Sayed M. S. E.,Le-Khac N.-A.,Azer M. A.,Jurcut A. D. .2022 .A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs,”. IEEE Transactions on Cognitive Communications and Networking, 3186331(4) : 1862-1880.
[15] Ullah I.,Mahmoud Q. H.,International IEEE .2017 .Conference on Big Data (Big Data). Dec, 8258163 : .
[16] Kasongo S. M.,Sun Y.,Nov Y. .2020 .Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset,”. Journal of Big Data, 7(1) : .
[17] Alhowaide A.,I. Alsmadi A.,Tang J.,International IEEE,IOT IEEE .2020 .Random-Forest and Pearson Correlation for Dimensionality Reduction in IoT IDS. , 9216388 : .
[18] Binbusayyis A.,Vaiyapuri T.,Jul T. .2020 .Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. ” Heliyon, 6(7) : e04262.
[19] Husain A.,Salem A.,Jim C. .2019 .Development of an Efficient Network Intrusion Detection Model Using Extreme Gradient Boosting (XGBoost) on the UNSW-NB15 Dataset. 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 9001867 : .
[20] Urbanowicz R. J.,Meeker M.,La W.,Cava W.,Olson R. S.,Moore J. H. .2018 .Relief-based feature selection: Introduction and review. ” Journal of Biomedical Informatics, 07 : 189-203.
[21] Spolaor N.,Cherman E. A.,Monard M. C.,Lee H. D. .2013 .ReliefF for Multi-label Feature Selection. 2013 Brazilian Conference on Intelligent Systems, 10 : .
[22] Hammad M.,Ismail Y. .2020 .Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset. 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), 9312002 : .
[23] K. M. Shazzad .2005 .Optimization of Intrusion Detection through Fast Hybrid Feature Selection,”. Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 181 : .
[24] Quinlan J. R. .1986 .Induction of decision trees. ” Machine Learning, 1(1) : 81-106.
[25] Dicholkar S.,Nirmal J. H. .2023 .Comparative Analysis of Resampling Techniques on Imbalanced CIE-CICIDS2018 Dataset for DoS Attack Detection”. J. of Data Acquisition and Processing, 38(3) : 2249-2260.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

18

Views