Identification of effective network features for probing attack detection

Existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. But not all the features are relevant ones and some of them are redundant and useless. This paper proposes and investigates identification of effective network features for Probing attack detection using PCA method to determine an optimal feature set. An appropriate feature set helps to build efficient decision model as well as a reduced feature set. Feature reduction will speed up the training and the testing process considerably. DARPA 1998 dataset was used in the experiments as the test data. Experimental results show a reduction in training and testing time while maintaining the detection accuracy within acceptable range.

[1]  Roberto Battiti,et al.  Identifying Intrusions in Computer Networks based on Principal Component Analysis , 2005 .

[2]  Adnan Hassan,et al.  Improved SPC chart pattern recognition using statistical features , 2003 .

[3]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[4]  Wenke Lee,et al.  A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .

[5]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[6]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[7]  T. S. Chou,et al.  Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms , 2008 .

[8]  Roberto Battiti,et al.  Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[9]  A.H. Sung,et al.  Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..

[10]  Andrew H. Sung,et al.  The Feature Selection and Intrusion Detection Problems , 2004, ASIAN.

[11]  Ian T. Jolliffe,et al.  Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.

[12]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[13]  Gene H. Golub,et al.  Matrix computations , 1983 .

[14]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.