Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection

Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection System. Feature selection improves classification by searching for the subset of features, which best classify the training data. This paper proposed approach uses Mutual Correlation for feature selection which reduces from 34 continuous attributes to 10 continuous attributes and Fuzzy Decision Tree for detection and diagnosis of attacks. Experimental results on the 10% KDD Cup 99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved high true positive rate (TPR) and significant reduce false positive rate (FP ). DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.591

[1]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[2]  Lalitha Rangarajan,et al.  Bi-level dimensionality reduction methods using feature selection and feature extraction , 2010 .

[3]  Erik D. Goodman,et al.  Genetic Algorithm Optimized Feature Transformation - A Comparison with Different Classifiers , 2003, GECCO.

[4]  H. Trussell,et al.  Constructing membership functions using statistical data , 1986 .

[5]  Christopher Krügel,et al.  Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[6]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[7]  Taeshik Shon,et al.  SVM Approach with a Genetic Algorithm for Network Intrusion Detection , 2005, ISCIS.

[8]  Erland Jonsson,et al.  Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.

[9]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[10]  K. Saravanan,et al.  An Efficient Detection Mechanism for Intrusion Detection Systems Using Rule Learning Method , 2009 .

[11]  Rangarajan Lalitha,et al.  Multi-Level Dimensionality Reduction Methods Using Feature Selection and Feature Extraction , 2010 .

[12]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[13]  M. Shyu,et al.  A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .

[14]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[15]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[16]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.

[17]  Lucas M. Venter,et al.  A comparison of Intrusion Detection systems , 2001, Comput. Secur..