Validity Based Approach for Feature Selection in Intrusion Detection Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Computer networks are vulnerable to growing number of security threats. The increase of attacks has caused obvious damages throughout the network at individual, enterprise, and government level. Intrusion detection systems are one of the tools that detect and remedy the presence of malicious activities. Intrusion detection systems face many challenges in terms of accurate analysis and evaluation. This paper proposes a new Intrusion detection system by deploying an entropy-based measure called V-measure to select significant features and reduce dimensionality while maintaining high accuracy in classification. The proposed intrusion detection system was tested on the CICIDS2017 dataset by applying machine learning classifiers such as Random Forest, Support Vector Machine, and RepTree algorithms. We then compared the results of the features selected with other features selection tools for correct classification of attacks. The expected results showed that the proposed method reduced irrelevant features and improved detection accuracy of the attacks while reducing the false positive rate.

Original languageEnglish
Title of host publicationIEEE SoutheastCon 2020, SoutheastCon 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages8
ISBN (Electronic)9781728168616
ISBN (Print)9781728168616
DOIs
StatePublished - Mar 28 2020
Event2020 IEEE SoutheastCon, SoutheastCon 2020 - Virtual, Raleigh, United States
Duration: Mar 28 2020Mar 29 2020

Publication series

Name2020 SoutheastCon

Conference

Conference2020 IEEE SoutheastCon, SoutheastCon 2020
Country/TerritoryUnited States
CityVirtual, Raleigh
Period3/28/203/29/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

ASJC Scopus Subject Areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Signal Processing

Keywords

  • Feature Selection
  • Intrusion Detection
  • Network Security

Fingerprint

Dive into the research topics of 'Validity Based Approach for Feature Selection in Intrusion Detection Systems'. Together they form a unique fingerprint.

Cite this