Open Access Open Access  Restricted Access Subscription Access

A Novel Approach for Feature Selection Technique in NSL-KDD Data Set of Cyber Security


Affiliations
1 SSSUTMS, Bhopal, M.P., India
2 PVPSIT, Vijayawada, A.P., India
 

Background/Objectives: To design the best and worst solution and also to minimise false alarm rate and maximize the detection rate by using AJO

Methods/Statistical analysis: The Adaptive Jaya Optimization (AJO) technique is used to select best features among 41 features.

Findings: The intrusion detection work focuses on feature selection, because few of the features are inappropriate and additional which results prolonged detection procedure and diminishes the performance of an intrusion detection system (IDS). With AJO technique best 17 features were selected to have best accuracy.

Application: In this study the NSL-KDD data set is analysed and applied Adaptive Jaya Technique for selecting best features to minimize low false alarm rate & maximize detection rate.


Keywords

Intrusion Detection System, NSL-KDD Dataset, Feature Selection, Adaptive Jaya Optimization.
User
Notifications

  • S.M.H. Bamakan, H. Wang, T. Yingjie, Y. Shi. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing. 2016; 199, 90-102.
  • N. Ben-Asher, C. Gonzalez. Effects of cyber security knowledge on attack detection. Computers in Human Behavior. 2015; 48, 51-61.
  • R.A.R. Ashfaq, X.Z. Wang, J.Z. Huang, H. Abbas, Y.L. He. Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences. 2017; 378, 484-497.
  • M. Masud, B. Thuraisingham, L. Khan. Data mining tools for malware detection. Auerbach Publications. 2011.
  • J.M. Fossaceca, T.A. Mazzuchi, S. Sarkani. MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection. Expert Systems with Applications. 2015; 42(8), 4062-4080.
  • R. Venkata Rao Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. International Journal of Industrial Engineering Computations. 2016;
  • , 19–34 7. H. Liu, R. Setiono, H. Motoda, Z. Zhao. Feature Selection: An Ever Evolving Frontier in Data Mining, JMLR: Workshop and Conference Proceedings. 2010; 10, 4-13.
  • H. Chae, B. Jo, S.H. Choi, T. Park. Feature selection for intrusion detection using NSL-KDD. In: Proceedings of the 12th WSEAS International Conference on Information Security and Privacy. 2013; 184–187.

Abstract Views: 347

PDF Views: 174




  • A Novel Approach for Feature Selection Technique in NSL-KDD Data Set of Cyber Security

Abstract Views: 347  |  PDF Views: 174

Authors

Thupakula Bhaskar
SSSUTMS, Bhopal, M.P., India
Tryambak Hiwarkar
SSSUTMS, Bhopal, M.P., India
K. Ramanjaneyulu
PVPSIT, Vijayawada, A.P., India

Abstract


Background/Objectives: To design the best and worst solution and also to minimise false alarm rate and maximize the detection rate by using AJO

Methods/Statistical analysis: The Adaptive Jaya Optimization (AJO) technique is used to select best features among 41 features.

Findings: The intrusion detection work focuses on feature selection, because few of the features are inappropriate and additional which results prolonged detection procedure and diminishes the performance of an intrusion detection system (IDS). With AJO technique best 17 features were selected to have best accuracy.

Application: In this study the NSL-KDD data set is analysed and applied Adaptive Jaya Technique for selecting best features to minimize low false alarm rate & maximize detection rate.


Keywords


Intrusion Detection System, NSL-KDD Dataset, Feature Selection, Adaptive Jaya Optimization.

References