Extracting salient features for network intrusion detection using machine learning methods
This work presents a data preprocessing and feature selection framework to support data mining and network security experts in minimal feature set selection of intrusion detection data. This process is supported by detailed visualisation and examination of class distributions. Distribution histogram...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
South African Institute of Computer Scientists and Information Technologists
2014-06-01
|
Series: | South African Computer Journal |
Subjects: | |
Online Access: | http://sacj.cs.uct.ac.za/index.php/sacj/article/view/200 |
_version_ | 1818035133542825984 |
---|---|
author | Ralf C. Staudemeyer Christian W. Omlin |
author_facet | Ralf C. Staudemeyer Christian W. Omlin |
author_sort | Ralf C. Staudemeyer |
collection | DOAJ |
description | This work presents a data preprocessing and feature selection framework to support data mining and network security experts in minimal feature set selection of intrusion detection data. This process is supported by detailed visualisation and examination of class distributions. Distribution histograms, scatter plots and information gain are presented as supportive feature reduction tools. The feature reduction process applied is based on decision tree pruning and backward elimination. This paper starts with an analysis of the KDD Cup '99 datasets and their potential for feature reduction. The dataset consists of connection records with 41 features whose relevance for intrusion detection are not clear. All traffic is either classified `normal' or into the four attack types denial-of-service, network probe, remote-to-local or user-to-root. Using our custom feature selection process, we show how we can significantly reduce the number features in the dataset to a few salient features. We conclude by presenting minimal sets with 4--8 salient features for two-class and multi-class categorisation for detecting intrusions, as well as for the detection of individual attack classes; the performance using a static classifier compares favourably to the performance using all features available. The suggested process is of general nature and can be applied to any similar dataset. |
first_indexed | 2024-12-10T06:50:13Z |
format | Article |
id | doaj.art-a4e3cee8ebfc44b589f161a054d270a4 |
institution | Directory Open Access Journal |
issn | 1015-7999 2313-7835 |
language | English |
last_indexed | 2024-12-10T06:50:13Z |
publishDate | 2014-06-01 |
publisher | South African Institute of Computer Scientists and Information Technologists |
record_format | Article |
series | South African Computer Journal |
spelling | doaj.art-a4e3cee8ebfc44b589f161a054d270a42022-12-22T01:58:33ZengSouth African Institute of Computer Scientists and Information TechnologistsSouth African Computer Journal1015-79992313-78352014-06-0105290Extracting salient features for network intrusion detection using machine learning methodsRalf C. StaudemeyerChristian W. OmlinThis work presents a data preprocessing and feature selection framework to support data mining and network security experts in minimal feature set selection of intrusion detection data. This process is supported by detailed visualisation and examination of class distributions. Distribution histograms, scatter plots and information gain are presented as supportive feature reduction tools. The feature reduction process applied is based on decision tree pruning and backward elimination. This paper starts with an analysis of the KDD Cup '99 datasets and their potential for feature reduction. The dataset consists of connection records with 41 features whose relevance for intrusion detection are not clear. All traffic is either classified `normal' or into the four attack types denial-of-service, network probe, remote-to-local or user-to-root. Using our custom feature selection process, we show how we can significantly reduce the number features in the dataset to a few salient features. We conclude by presenting minimal sets with 4--8 salient features for two-class and multi-class categorisation for detecting intrusions, as well as for the detection of individual attack classes; the performance using a static classifier compares favourably to the performance using all features available. The suggested process is of general nature and can be applied to any similar dataset.http://sacj.cs.uct.ac.za/index.php/sacj/article/view/200network intrusion detection: feature selectionmachine learningdecision trees |
spellingShingle | Ralf C. Staudemeyer Christian W. Omlin Extracting salient features for network intrusion detection using machine learning methods South African Computer Journal network intrusion detection: feature selection machine learning decision trees |
title | Extracting salient features for network intrusion detection using machine learning methods |
title_full | Extracting salient features for network intrusion detection using machine learning methods |
title_fullStr | Extracting salient features for network intrusion detection using machine learning methods |
title_full_unstemmed | Extracting salient features for network intrusion detection using machine learning methods |
title_short | Extracting salient features for network intrusion detection using machine learning methods |
title_sort | extracting salient features for network intrusion detection using machine learning methods |
topic | network intrusion detection: feature selection machine learning decision trees |
url | http://sacj.cs.uct.ac.za/index.php/sacj/article/view/200 |
work_keys_str_mv | AT ralfcstaudemeyer extractingsalientfeaturesfornetworkintrusiondetectionusingmachinelearningmethods AT christianwomlin extractingsalientfeaturesfornetworkintrusiondetectionusingmachinelearningmethods |