A novel technique for converting nominal attributes to numeric attributes for intrusion detection

Intrusion Detection has been a popular area of research due to increase in number of attacks. Intrusion Detection is a classification problem, in which some of the attributes are nominal. Classification algorithms like Support Vector Machine, Extreme Learning Machine, Neural Network etc. are not capable of handling nominal features. This leads to the need of method for converting nominal features to numeric features. None of research articles published till date have evaluated the appropriate method of nominal to numeric conversion for intrusion detection problem. This work explores Target Methods, Dummy Methods and Influence Value Method for Intrusion Detection to convert nominal attributes to numeric attributes. This work also proposes a new method for nominal to numeric conversion, which performs better than existing methods. The results presented in this paper evaluated using NSL-KDD.

[1]  Kangfeng Zheng,et al.  Intrusion detection algorithm based on density, cluster centers, and nearest neighbors , 2016, China Communications.

[2]  Tawfiq S. Barhoom,et al.  Network Intrusion Detection Using Semi- Supervised Learning Based on Normal Behaviour's Standard Deviation , 2015 .

[3]  E. A. Mary Anita,et al.  Heuristic Approach of Supervised Learning for Intrusion Detection , 2014 .

[4]  Yasmen Wahba,et al.  Improving the Performance of Multi-class Intrusion Detection Systems using Feature Reduction , 2015, ArXiv.

[6]  Snehal A. Mulay,et al.  Intrusion Detection System using Support Vector Machine and Decision Tree , 2010 .

[7]  Mei-Ling Shyu,et al.  Handling nominal features in anomaly intrusion detection problems , 2005, 15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications (RIDE-SDMA'05).

[8]  B. Muthukumar,et al.  Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .

[9]  Kapil Wankhade,et al.  Intrusion Detection System Using New Ensemble Boosting Approach , 2012 .

[10]  Francisco Herrera,et al.  Data Preprocessing in Data Mining , 2014, Intelligent Systems Reference Library.

[11]  Bhawna Nigam,et al.  Network Intrusion Detection using Semi Supervised Support Vector Machine , 2014 .

[12]  Z. Kouba,et al.  Data pre-processing support for data mining , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[13]  Sapna Malik,et al.  Anomaly based Intrusion Detection in Android Mobiles: A Review , 2019 .

[14]  Shahram Sarkani,et al.  A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..

[15]  Balachandra Muniyal,et al.  Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .

[16]  Swati Paliwal,et al.  Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .

[17]  Sameer Dixit,et al.  An Implementation of Data Pre-Processing for Small Dataset , 2014 .

[18]  Yongzhong Li,et al.  An Intrusion Detection Algorithm Based on Multi-label Learning , 2022 .

[19]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[20]  Kumar Jain Yogendra Intrusion Detection using Supervised Learning with Feature Set Reduction , 2011 .

[21]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[22]  Puja Padiya,et al.  Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[23]  Chi Cheng,et al.  Extreme learning machines for intrusion detection , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[24]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[25]  Wei Hu,et al.  AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[26]  B. Surendiran,et al.  Dimensionality reduction using Principal Component Analysis for network intrusion detection , 2016 .