2010 17th International Conference on Telecommunications 2010
DOI: 10.1109/ictel.2010.5478852
|View full text |Cite
|
Sign up to set email alerts
|

Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach

Abstract: Intrusion detection datasets play a key role in fine tuning Intrusion Detection Systems (IDSs). Using such datasets one can distinguish between regular and anomalous behavior of agiven node in the network. To build this dataset is not straightforward, though, as only the most significant features of the collected data for detecting the node's behavior should be considered. We propose in this paper a technique for selecting relevant features out of KDD99 using a hybrid approach toward an optimal subset of featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 8 publications
0
14
0
1
Order By: Relevance
“…Analysis of KDD-99 dataset with its 41 features was presented based on calculating the information gain and the entropy of each feature to measure its relevance [3]. The fourth feature selection method is proposed by [4]. In this study, a hybrid approach is used to obtain the optimal set of 14 features.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Analysis of KDD-99 dataset with its 41 features was presented based on calculating the information gain and the entropy of each feature to measure its relevance [3]. The fourth feature selection method is proposed by [4]. In this study, a hybrid approach is used to obtain the optimal set of 14 features.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The proposed methods use an ensemble of Random Forest (RF) algorithm, with forward and backward ranking features selection techniques [1][2]. To prove the usefulness of the proposed methods, we compare our results with those of other three well-known feature sets [3][4][5] on KDD-99 dataset.…”
Section: Introductionmentioning
confidence: 94%
“…The output of PCA is reduced low dimensional dataset and the number of dimensions to be selected can be set manually by altering the standard deviation limit. The datasets with different dimensions namely 5, 6,7,8,9,10,13,14,15,18,24, and 42 are taken to compare performance of eight machine learning algorithms to find the minimum dimensions which gives high accuracy rate and low detection time. Figure 4 depicts detection time of eight different machine learning algorithms for different dimensions.…”
Section: Resultsmentioning
confidence: 99%
“…In this work, PCA [10] adopted to reduce the detection time of network based intrusions. KDD99 dataset [7] has been used in this work to measure the detection rate of the following machine learning algorithms Support Vector Machines (SVM), K-Nearest Neighbors (KNN), J48 Tree algorithm, Random Forest Tree classification algorithm, Adaboost algorihm, Nearest Neighbors generalized Exemplars algorithm, Navebayes probabilistic classifier and Voting Features Interval classification algorithms. The rest of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Reference [9] proposed a hybrid approach combining the information gain ratio (IGR) and the k-means classifier. Reference [10] proposed a feature selection method based on Rough Sets, improved Genetic Algorithms and clustering.…”
Section: Related Workmentioning
confidence: 99%