PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM CLASSIFIERS USING VARIOUS FEATURE REDUCTION TECHNIQUES

In this paper, we compare the performance of Intrus ion Detection System Classifiers using various feature reduction techniques. To enhance the learni ng capabilities and reduce the computational intens ity of competitive learning neural network classifiers, di fferent dimension reduction techniques have been pr oposed. These include: Principal Component Analysis, Linear Discriminant Analysis, Independent Component Analy sis. Many Intrusion Detection Systems are based on neura l networks. However, they are computationally very demanding . In order to mitigate this problem, dime nsion reduction techniques are applied to a given d ataset to extract important features. In the proposed researc h various classifiers are applied to the reduced fe atur dataset and their performance is compared. On the basis of these results, a technique is proposed which perfor ms exceptionally well, in terms of both accuracy and c omputation time. When applied to the KDDCUP99 reduc ed feature dataset, this technique performs better tha n a standard learning schema based on the full feat ured dataset.

[1]  R. Lippmann,et al.  Passive Operating System Identification From TCP / IP Packet Headers * , 2003 .

[2]  Alok N. Choudhary,et al.  A reconfigurable architecture for network intrusion detection using principal component analysis , 2006, FPGA '06.

[3]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[4]  Khaled Labib,et al.  NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .

[5]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[6]  Hans-Peter Kriegel,et al.  The pyramid-technique: towards breaking the curse of dimensionality , 1998, SIGMOD '98.

[7]  Hubert Kordylewski,et al.  A large memory storage and retrieval neural network for medical and engineering diagnosis/fault detection , 1998 .

[8]  Daniel Graupe,et al.  Principles of Artificial Neural Networks , 2018, Advanced Series in Circuits and Systems.

[9]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[10]  S. Selvan,et al.  Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network , 2007 .

[11]  Morteza Amini,et al.  Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory ( ART ) , 2022 .

[12]  Carla E. Brodley,et al.  Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.

[13]  Jing Gao,et al.  A Novel Framework for Incorporating Labeled Examples into Anomaly Detection , 2006, SDM.

[14]  V.V. Phoha,et al.  Dimension reduction using feature extraction methods for real-time misuse detection systems , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[15]  M. Shyu,et al.  A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .

[16]  I K Fodor,et al.  A Survey of Dimension Reduction Techniques , 2002 .