An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

by   Mouhammd Alkasassbeh, et al.

Despite the great developments in information technology, particularly the Internet, computer networks, global information exchange, and its positive impact in all areas of daily life, it has also contributed to the development of penetration and intrusion which forms a high risk to the security of information organizations, government agencies, and causes large economic losses. There are many techniques designed for protection such as firewall and intrusion detection systems (IDS). IDS is a set of software and/or hardware techniques used to detect hacker's activities in computer systems. Two types of anomalies are used in IDS to detect intrusive activities different from normal user behavior. Misuse relies on the knowledge base that contains all known attack techniques and intrusion is discovered through research in this knowledge base. Artificial intelligence techniques have been introduced to improve the performance of these systems. The importance of IDS is to identify unauthorized access attempting to compromise confidentiality, integrity or availability of the computer network. This paper investigates the Intrusion Detection (ID) problem using three machine learning algorithms namely, BayesNet algorithm, Multi-Layer Perceptron (MLP), and Support Vector Machine (SVM). The algorithms are applied on a real, Management Information Based (MIB) dataset that is collected from real life environment. To enhance the detection process accuracy, a set of feature selection approaches is used; Infogain (IG), ReleifF (RF), and Genetic Search (GS). Our experiments show that the three feature selection methods have enhanced the classification performance. GS with bayesNet, MLP and SVM give high accuracy rates, more specifically the BayesNet with the GS accuracy rate is 99.9



There are no comments yet.


page 1

page 2

page 3

page 4


TS-RF: Combinatorial Optimization based Feature Selection Method for Network Intrusion Detection

Advancements in computer networks and communication technologies like so...

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

In the world today computer networks have a very important position and ...

An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier

Since Internet is so popular and prevailing in human life, countering cy...

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Cyber attacks constitute a significant threat to organizations with impl...

Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach

False alerts due to misconfigured/ compromised IDS in ICS networks can l...

Using Side Channel Information and Artificial Intelligence for Malware Detection

Cybersecurity continues to be a difficult issue for society especially a...

Online Feature Ranking for Intrusion Detection Systems

Many current approaches to the design of intrusion detec- tion systems a...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.