Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm

The feature selection techniques are used to find the most important and relevant features in a dataset. Therefore, in this study feature selection technique was used to improve the performance of Anomaly Detection. Many feature selection techniques have been developed and implemented on the NSL-KDD dataset. However, with the rapid growth of traffic on a network where more applications, devices, and protocols participate, the traffic data is complex and heterogeneous contribute to security issues. This makes the NSL-KDD dataset no longer reliable for it. The detection model must also be able to recognize the type of novel attack on complex network datasets. So, a robust analysis technique for a more complex and larger dataset is required, to overcome the increase of security issues in a big data network. This study proposes particle swarm optimization (PSO) Search methods as a feature selection method. As contribute to feature analysis knowledge, In the experiment a combination of particle swarm optimization (PSO) Search methods with other search methods are examined. To overcome the limitation NSL-KDD dataset, in the experiments the CICIDS2017 dataset used. To validate the selected features from the proposed technique J48 classification algorithm used in this study. The detection performance of the combination PSO Search method with J48 examined and compare with other feature selection and previous study. The proposed technique successfully finds the important features of the dataset, which improve detection performance with 99.89% accuracy. Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.

[1]  Shadi Aljawarneh,et al.  An enhanced J48 classification algorithm for the anomaly intrusion detection systems , 2017, Cluster Computing.

[2]  Naimah Yaakob,et al.  Effective and efficient network anomaly detection system using machine learning algorithm , 2019, Bulletin of Electrical Engineering and Informatics.

[3]  Reazul Kabir,et al.  A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach , 2017 .

[4]  J. Albert Mayan,et al.  Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools , 2019 .

[5]  Hossein Gharaee,et al.  A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).

[6]  Ahmed Ahmim,et al.  A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models , 2018, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[7]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[8]  Deepak Dahiya,et al.  Enhanced Intrusion Detection System for Detecting Rare Class Attacks using Correlation based Dimensionality Reduction Technique , 2016 .

[9]  A Niranjan,et al.  ERCR TV: Ensemble of Random Committee and Random Tree for Efficient Anomaly Classification Using Voting , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).

[10]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[11]  K. A. Taher,et al.  Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).

[12]  Shikha Agrawal,et al.  A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[13]  Kajal Rai,et al.  Decision Tree Based Algorithm for Intrusion Detection , 2016 .

[14]  Bu Sung Lee Francis,et al.  Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection , 2016, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC).

[15]  Qing Chang,et al.  Feature selection methods for big data bioinformatics: A survey from the search perspective. , 2016, Methods.

[16]  Cherukuri Aswani Kumar,et al.  Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..

[17]  Sudarson Jena,et al.  Efficient Feature Subset Selection Algorithm for High Dimensional Data , 2016 .

[18]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[19]  Aderemi Oluyinka Adewumi,et al.  Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision , 2017, Int. J. Netw. Secur..

[20]  Deepak Dahiya,et al.  Features Contribution for Detecting Attacks of an Intrusion Detection System , 2017 .

[21]  Abderrahmane Hajraoui,et al.  A Survey of Malware Detection Techniques based on Machine Learning , 2019, International Journal of Advanced Computer Science and Applications.

[22]  Gulshan Kumar,et al.  Analysis of Feature Selection Techniques: A Data Mining Approach , 2016 .

[23]  Adel Binbusayyis,et al.  Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach , 2019, IEEE Access.

[24]  Sudhir Kumar Sharma,et al.  Performance Analysis of User to Root Attack Class Using Correlation Based Feature Selection Model , 2015, CISIS-ICEUTE.

[25]  Ali A. Ghorbani,et al.  Towards a Reliable Intrusion Detection Benchmark Dataset , 2017 .

[26]  Sevcan Yilmaz Gündüz,et al.  Feature Selection and Comparison of Classification Algorithms for Intrusion Detection , 2018 .

[27]  Sushant Kumar Pandey Design and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system , 2019, Secur. Priv..

[28]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[29]  Peyman Kabiri,et al.  Feature Selection for Intrusion Detection System Using Ant Colony Optimization , 2016, Int. J. Netw. Secur..

[30]  Zeynep Turgut,et al.  Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).

[31]  Shulin Wang,et al.  Feature selection in machine learning: A new perspective , 2018, Neurocomputing.

[32]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.