Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection

An intrusion detection system is one of the main defense lines used to provide security to data, information, and computer networks. The problems of this security system are the increased processing time, high false alarm rate, and low detection rate that occur due to the large amount of data contai...

Full description

Bibliographic Details
Main Authors: Yousef Almaghthawi, Iftikhar Ahmad, Fawaz E. Alsaadi
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/10/24/4745
_version_ 1797456481568686080
author Yousef Almaghthawi
Iftikhar Ahmad
Fawaz E. Alsaadi
author_facet Yousef Almaghthawi
Iftikhar Ahmad
Fawaz E. Alsaadi
author_sort Yousef Almaghthawi
collection DOAJ
description An intrusion detection system is one of the main defense lines used to provide security to data, information, and computer networks. The problems of this security system are the increased processing time, high false alarm rate, and low detection rate that occur due to the large amount of data containing various irrelevant and redundant features. Therefore, feature selection can solve this problem by reducing the number of features. Choosing appropriate feature selection methods that can reduce the number of features without a negative effect on the classification accuracy is a major challenge. This challenge motivated us to investigate the application of different wrapper feature selection techniques in intrusion detection. The performance of the selected techniques, such as the genetic algorithm (GA), sequential forward selection (SFS), and sequential backward selection (SBS), were analyzed, addressed, and compared to the existing techniques. The efficiency of the three feature selection techniques with two classification methods, including support vector machine (SVM) and multi perceptron (MLP), was compared. The CICIDS2017, CSE-CIC-IDS218, and NSL-KDD datasets were considered for the experiments. The efficiency of the proposed models was proved in the experimental results, which indicated that it had highest accuracy in the selected datasets.
first_indexed 2024-03-09T16:08:26Z
format Article
id doaj.art-c975810c190947c8b8bdc2db5e0cb514
institution Directory Open Access Journal
issn 2227-7390
language English
last_indexed 2024-03-09T16:08:26Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj.art-c975810c190947c8b8bdc2db5e0cb5142023-11-24T16:28:59ZengMDPI AGMathematics2227-73902022-12-011024474510.3390/math10244745Performance Analysis of Feature Subset Selection Techniques for Intrusion DetectionYousef Almaghthawi0Iftikhar Ahmad1Fawaz E. Alsaadi2Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaAn intrusion detection system is one of the main defense lines used to provide security to data, information, and computer networks. The problems of this security system are the increased processing time, high false alarm rate, and low detection rate that occur due to the large amount of data containing various irrelevant and redundant features. Therefore, feature selection can solve this problem by reducing the number of features. Choosing appropriate feature selection methods that can reduce the number of features without a negative effect on the classification accuracy is a major challenge. This challenge motivated us to investigate the application of different wrapper feature selection techniques in intrusion detection. The performance of the selected techniques, such as the genetic algorithm (GA), sequential forward selection (SFS), and sequential backward selection (SBS), were analyzed, addressed, and compared to the existing techniques. The efficiency of the three feature selection techniques with two classification methods, including support vector machine (SVM) and multi perceptron (MLP), was compared. The CICIDS2017, CSE-CIC-IDS218, and NSL-KDD datasets were considered for the experiments. The efficiency of the proposed models was proved in the experimental results, which indicated that it had highest accuracy in the selected datasets.https://www.mdpi.com/2227-7390/10/24/4745intrusion detectiongenetic algorithmgreedy searchbackward elimination learningNSL-KDDCIC-IDS-2017
spellingShingle Yousef Almaghthawi
Iftikhar Ahmad
Fawaz E. Alsaadi
Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
Mathematics
intrusion detection
genetic algorithm
greedy search
backward elimination learning
NSL-KDD
CIC-IDS-2017
title Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
title_full Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
title_fullStr Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
title_full_unstemmed Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
title_short Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
title_sort performance analysis of feature subset selection techniques for intrusion detection
topic intrusion detection
genetic algorithm
greedy search
backward elimination learning
NSL-KDD
CIC-IDS-2017
url https://www.mdpi.com/2227-7390/10/24/4745
work_keys_str_mv AT yousefalmaghthawi performanceanalysisoffeaturesubsetselectiontechniquesforintrusiondetection
AT iftikharahmad performanceanalysisoffeaturesubsetselectiontechniquesforintrusiondetection
AT fawazealsaadi performanceanalysisoffeaturesubsetselectiontechniquesforintrusiondetection