Analysis of Various Feature Selection Techniques for Network Intrusion Detection Dataset in WEKA

As the data on the network is growing day by day, there is requirement of detecting that data for intrusions with high speed and accuracy. These growing Network data is causing a serious problem of detecting intrusions to protect the useful information on the network. There are numerous network security tools to protect network from intrusions but still the fast growth of intrusive activities is a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and Feature Selection Techniques help to design “Intrusion Detection Models” which can classify the network traffic into intrusive or normal traffic. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Finally the performance of the six reduced feature sets has been analyzed.

[1]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[2]  S. García,et al.  An Extension on "Statistical Comparisons of Classifiers over Multiple Data Sets" for all Pairwise Comparisons , 2008 .

[3]  Manas Ranjan Patra,et al.  Ensembling Rule Based Classifiers for Detecting Network Intrusions , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[4]  Manas Ranjan Patra,et al.  A Comparative Study of Data Mining Algorithms for Network Intrusion Detection , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[5]  Ruggero G. Pensa,et al.  Context-Based Distance Learning for Categorical Data Clustering , 2009, IDA.

[6]  Subhash C. Bagui,et al.  Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.

[7]  Peter A. Flach,et al.  Machine Learning - The Art and Science of Algorithms that Make Sense of Data , 2012 .

[8]  Mohd Fauzi Othman,et al.  Comparison of different classification techniques using WEKA for breast cancer , 2007 .

[9]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[10]  Patrick Henry Winston,et al.  Artificial intelligence (3rd ed.) , 1992 .

[11]  Shakhina Pulatova COVERING (RULE-BASED) ALGORITHMS , 2006 .

[12]  Deokjai Choi,et al.  Application of Data Mining to Network Intrusion Detection: Classifier Selection Model , 2008, APNOMS.

[13]  Ming-Yang Su,et al.  Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN , 2008, ISI Workshops.

[14]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.