A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
Abstract
:1. Introduction
- In order to detect attacks efficiently, the first contribution was made with the feature selection approach (FSAP).
- Afterwards, a hybrid classification technique (SABADT) was presented to detect attacks with high accuracy.
- Finally, an application was made on the KDD ‘99 datasets in the literature for the performance evaluation of the suggested approaches and techniques.
2. Related Work
2.1. Needs for Feature Selection
- To remove unrelated and noisy data;
- To make the data more understandable and visible;
- To prevent excessive learning and increase the performance of the model that is used;
- To reduce data cost;
- To reduce the complexity of the model that is used;
- To reduce storage requirements and computational cost.
2.2. Feature Selection Approaches
2.3. Literature Review of Feature Selection Methods for Intrusion Detection Systems
Evaluation of Feature Selection Methods in the Literature
3. Methodology of FSACM
- Choosing and analyzing the dataset.
- Identifying important features and organizing them into groups.
- Detecting anomaly-based and signature-based attacks.
- Using the training and classification for identifying attacks.
- Classification of attacks according to their behavior.
3.1. Feature Selection Approach—FSAP
Algorithm 1: Feature Selection |
3.2. Hybrid Signature- and Anomaly-Based Attack Detection Technique—SABADT
3.2.1. Signature Based Model
Algorithm 2: Signature Based Model |
3.2.2. Anomaly-Based Model
Algorithm 3: Anomaly Based Model |
3.3. Evaluating of Model Performance
4. Application of Methodology
4.1. KDD ’99 Dataset
4.2. UNSW-NB15 Dataset
5. Results and Discussion
6. Limitation and Future Work
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 2023, 12, 1333. [Google Scholar]
- Yuvaraj, N.; Raja, R.A.; Karthikeyan, T.; Praghash, K. Improved authentication in secured multicast wireless sensor network (MWSN) using opposition frog leaping algorithm to resist man-in-middle attack. Wirel. Pers. Commun. 2022, 123, 1715–1731. [Google Scholar]
- Potteti, S.; Parati, N. Intrusion detection system using hybrid Fuzzy Genetic algorithm. In Proceedings of the 2017 International Conference on Trends in Electronics and Informatics (ICEI), Tirunelveli, India, 11–12 May 2017; pp. 613–618. [Google Scholar]
- Williams, C.M.; Chaturvedi, R.; Chakravarthy, K. Cybersecurity risks in a pandemic. J. Med. Internet Res. 2020, 22, e23692. [Google Scholar] [CrossRef]
- Arpaci, I.; Aslan, O. Development of a scale to measure cybercrime-awareness on social media. J. Comput. Inf. Syst. 2023, 63, 695–705. [Google Scholar] [CrossRef]
- Aslan, Ö.A.; Samet, R. A comprehensive review on malware detection approaches. IEEE Access 2020, 8, 6249–6271. [Google Scholar] [CrossRef]
- Ozkan-Okay, M.; Samet, R.; Aslan, Ö.; Gupta, D. A comprehensive systematic literature review on intrusion detection systems. IEEE Access 2021, 9, 157727–157760. [Google Scholar]
- Otair, M.; Ibrahim, O.T.; Abualigah, L.; Altalhi, M.; Sumari, P. An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wirel. Netw. 2022, 28, 721–744. [Google Scholar]
- Feng, B.; Zhou, H.; Li, G.; Zhang, Y.; Sood, K.; Yu, S. Enabling machine learning with service function chaining for security enhancement at 5G edges. IEEE Netw. 2021, 35, 196–201. [Google Scholar] [CrossRef]
- Wang, Y.; Ma, J.; Sharma, A.; Singh, P.K.; Gaba, G.S.; Masud, M.; Baz, M. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks. J. Sens. 2021, 2021, 5558860. [Google Scholar] [CrossRef]
- Amiri, F.; Yousefi, M.R.; Lucas, C.; Shakery, A.; Yazdani, N. Mutual information-based feature selection for intrusion detection systems. J. Netw. Comput. Appl. 2011, 34, 1184–1199. [Google Scholar] [CrossRef]
- Narayanasami, S.; Sengan, S.; Khurram, S.; Arslan, F.; Murugaiyan, S.K.; Rajan, R.; Peroumal, V.; Dubey, A.K.; Srinivasan, S.; Sharma, D.K. Biological feature selection and classification techniques for intrusion detection on BAT. Wirel. Pers. Commun. 2022, 127, 1763–1785. [Google Scholar] [CrossRef]
- Thakkar, A.; Lohiya, R. Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System. Inf. Fusion 2023, 90, 353–363. [Google Scholar] [CrossRef]
- Fu, G.; Li, B.; Yang, Y.; Wei, Q. A Multi-Distance Ensemble and Feature Clustering Based Feature Selection Approach for Network Intrusion Detection. In Proceedings of the 2022 International Symposium on Sensing and Instrumentation in 5G and IoT Era (ISSI), Shanghai, China, 17–18 November 2022; pp. 160–164. [Google Scholar]
- El-Rashidy, M.A.; Mohamed, R.G.; El-Fishawy, N.A.; Shouman, M.A. An effective text plagiarism detection system based on feature selection and SVM techniques. Multimed. Tools Appl. 2023, 1–38. [Google Scholar] [CrossRef]
- Singh, H. Performance analysis of unsupervised machine learning techniques for network traffic classification. In Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication Technologies, Haryana, India, 21–22 February 2015; pp. 401–404. [Google Scholar]
- Cai, J.; Luo, J.; Wang, S.; Yang, S. Feature selection in machine learning: A new perspective. Neurocomputing 2018, 300, 70–79. [Google Scholar]
- Lyu, Y.; Feng, Y.; Sakurai, K. A survey on feature selection techniques based on filtering methods for cyber attack detection. Information 2023, 14, 191. [Google Scholar] [CrossRef]
- Maldonado, J.; Riff, M.C.; Neveu, B. A review of recent approaches on wrapper feature selection for intrusion detection. Expert Syst. Appl. 2022, 198, 116822. [Google Scholar]
- Solorio-Fernández, S.; Carrasco-Ochoa, J.A.; Martínez-Trinidad, J.F. A review of unsupervised feature selection methods. Artif. Intell. Rev. 2020, 53, 907–948. [Google Scholar]
- Olusola, A.A.; Oladele, A.S.; Abosede, D.O. Analysis of KDD ’99 intrusion detection dataset for selection of relevance features. In Proceedings of the World Congress on Engineering and Computer Science, WCECS, San Francisco, CA, USA, 20–22 October 2010; Volume 1, pp. 20–22. [Google Scholar]
- Mohanabharathi, R.; Kalaikumaran, M.T.; Karthi, S. Feature selection for wireless intrusion detection system using filter and wrapper model. Int. J. Mod. Eng. Res. (IJMER) 2012, 2, 1552–1556. [Google Scholar]
- Bostani, H.; Sheikhan, M. Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft Comput. 2017, 21, 2307–2324. [Google Scholar] [CrossRef]
- Aminanto, M.E.; Tanuwidjaja, H.C.; Yoo, P.D.; Kim, K. Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier. In Proceedings of the 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, 23–24 September 2017; pp. 99–104. [Google Scholar]
- Mishra, P.; Varadharajan, V.; Tupakula, U.; Pilli, E.S. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 2018, 21, 686–728. [Google Scholar] [CrossRef]
- Mohammadi, S.; Mirvaziri, H.; Ghazizadeh-Ahsaee, M.; Karimipour, H. Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 2019, 44, 80–88. [Google Scholar] [CrossRef]
- Li, X.; Chen, W.; Zhang, Q.; Wu, L. Building auto-encoder intrusion detection system based on random forest feature selection. Comput. Secur. 2020, 95, 101851. [Google Scholar] [CrossRef]
- Zhou, Y.; Cheng, G.; Jiang, S.; Dai, M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 2020, 174, 107247. [Google Scholar] [CrossRef]
- Nancy, P.; Muthurajkumar, S.; Ganapathy, S.; Santhosh Kumar, S.; Selvi, M.; Arputharaj, K. Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun. 2020, 14, 888–895. [Google Scholar] [CrossRef]
- Nazir, A.; Khan, R.A. A novel combinatorial optimization based feature selection method for network intrusion detection. Comput. Secur. 2021, 102, 102164. [Google Scholar] [CrossRef]
- Al-Safi, A.H.S.; Hani, Z.I.R.; Zahra, M.A. Using a hybrid algorithm and feature selection for network anomaly intrusion detection. J. Mech. Eng. Res. Dev. 2021, 44, 253–262. [Google Scholar]
- Krishnaveni, S.; Sivamohan, S.; Sridhar, S.; Prabakaran, S. Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 2021, 24, 1761–1779. [Google Scholar] [CrossRef]
- Quincozes, S.E.; Passos, D.; Albuquerque, C.; Mossé, D.; Ochi, L.S. An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer. Ann. Telecommun. 2022, 77, 457–471. [Google Scholar] [CrossRef]
- Prasad, M.; Gupta, R.K.; Tripathi, S. A multi-level correlation-based feature selection for intrusion detection. Arab. J. Sci. Eng. 2022, 47, 10719–10729. [Google Scholar] [CrossRef]
- Albulayhi, K.; Abu Al-Haija, Q.; Alsuhibany, S.A.; Jillepalli, A.A.; Ashrafuzzaman, M.; Sheldon, F.T. IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl. Sci. 2022, 12, 5015. [Google Scholar] [CrossRef]
- Sangaiah, A.K.; Javadpour, A.; Ja’fari, F.; Pinto, P.; Zhang, W.; Balasubramanian, S. A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things. Clust. Comput. 2023, 26, 599–612. [Google Scholar] [CrossRef]
- Subramani, S.; Selvi, M. Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik 2023, 273, 170419. [Google Scholar] [CrossRef]
- Ozkan-Okay, M.; Aslan, Ö.; Eryigit, R.; Samet, R. SABADT: Hybrid intrusion detection approach for cyber attacks identification in WLAN. IEEE Access 2021, 9, 157639–157653. [Google Scholar] [CrossRef]
- Yu, S.J.; Koh, P.; Kwon, H.; Kim, D.S.; Kim, H.K. Hurst parameter based anomaly detection for intrusion detection system. In Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8–10 December 2016; pp. 234–240. [Google Scholar]
- Belavagi, M.C.; Muniyal, B. Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 2016, 89, 117–123. [Google Scholar] [CrossRef]
- Saranya, T.; Sridevi, S.; Deisy, C.; Chung, T.D.; Khan, M.A. Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Comput. Sci. 2020, 171, 1251–1260. [Google Scholar] [CrossRef]
- Almseidin, M.; Alzubi, M.; Kovacs, S.; Alkasassbeh, M. Evaluation of machine learning algorithms for intrusion detection system. In Proceedings of the 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 14–16 September 2017; pp. 000277–000282. [Google Scholar]
- Khammassi, C.; Krichen, S. A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 2017, 70, 255–277. [Google Scholar] [CrossRef]
- Dhanabal, L.; Shantharajah, S. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 446–452. [Google Scholar]
- Li, Y.; Xia, J.; Zhang, S.; Yan, J.; Ai, X.; Dai, K. An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 2012, 39, 424–430. [Google Scholar] [CrossRef]
- Karimi, Z.; Kashani, M.M.R.; Harounabadi, A. Feature ranking in intrusion detection dataset using combination of filtering methods. Int. J. Comput. Appl. 2013, 78, 21–27. [Google Scholar] [CrossRef]
- Saxena, H.; Richariya, V. Intrusion detection in KDD ’99 dataset using SVM-PSO and feature reduction with information gain. Int. J. Comput. Appl. 2014, 98, 25–29. [Google Scholar]
- Moustafa, N.; Slay, J. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD ’99 data set. Inf. Secur. J. Glob. Perspect. 2016, 25, 18–31. [Google Scholar] [CrossRef]
- Aghdam, M.H.; Kabiri, P. Feature selection for intrusion detection system using ant colony optimization. Int. J. Netw. Secur. 2016, 18, 420–432. [Google Scholar]
- Hasan, M.A.M.; Nasser, M.; Ahmad, S.; Molla, K.I. Feature selection for intrusion detection using random forest. J. Inf. Secur. 2016, 7, 129–140. [Google Scholar] [CrossRef]
- Janarthanan, T.; Zargari, S. Feature selection in UNSW-NB15 and KDDCUP’99 datasets. In Proceedings of the 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, UK, 19–21 June 2017; pp. 1881–1886. [Google Scholar]
- Manzoor, I.; Kumar, N. A feature reduced intrusion detection system using ANN classifier. Expert Syst. Appl. 2017, 88, 249–257. [Google Scholar]
- Moukhafi, M.; El Yassini, K.; Bri, S. A novel hybrid GA and SVM with PSO feature selection for intrusion detection system. Int. J. Adv. Sci. Res. Eng. 2018, 4, 129–134. [Google Scholar] [CrossRef]
- Pham, N.T.; Foo, E.; Suriadi, S.; Jeffrey, H.; Lahza, H.F.M. Improving performance of intrusion detection system using ensemble methods and feature selection. In Proceedings of the Australasian Computer Science Week Multiconference, Brisband, QLD, Australia, 29 January–2 February 2018; pp. 1–6. [Google Scholar]
- Kanimozhi, V.; Jacob, P. UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int. J. Recent Technol. Eng. 2019, 7, 443–446. [Google Scholar]
- Chandak, T.; Ghorpade, C.; Shukla, S. Effective analysis of feature selection algorithms for network based intrusion detection system. In Proceedings of the 2019 IEEE Bombay Section Signature Conference (IBSSC), Mumbai, India, 26–28 July 2019; pp. 1–5. [Google Scholar]
- Selvakumar, B.; Muneeswaran, K. Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 2019, 81, 148–155. [Google Scholar]
- Almasoudy, F.H.; Al-Yaseen, W.L.; Idrees, A.K. Differential evolution wrapper feature selection for intrusion detection system. Procedia Comput. Sci. 2020, 167, 1230–1239. [Google Scholar] [CrossRef]
- Kasongo, S.M.; Sun, Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 2020, 7, 1–20. [Google Scholar] [CrossRef]
- Iwendi, C.; Khan, S.; Anajemba, J.H.; Mittal, M.; Alenezi, M.; Alazab, M. The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 2020, 20, 2559. [Google Scholar] [CrossRef]
- Kocher, G.; Kumar, G. Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection Using UNSW-NB15 Dataset. 2021. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3784406 (accessed on 8 May 2023).
Paper | Year | Proposed Method | Goal/Success |
---|---|---|---|
Olusola et al. [21] | 2010 | A novel feature selection method for KDD ’99 dataset | The performance was increased with less features |
Amiri et al. [11] | 2011 | A technique for selecting features that used the mutual information measure | A higher accuracy specifically for U2R and R2L attacks |
Mohanabharathi et al. [22] | 2012 | A wireless IDS that used filter and wrapper approaches | The number of features was reduced from 38 to 8 with higher accuracy |
Bostani and Sheikhan [23] | 2017 | A feature selection approach that combined binary gravitational search and mutual information techniques in a hybrid manner | The proposed method increased the detection and accuracy rates while decreasing the false-positive rates |
Aminanto et al. [24] | 2017 | Wi-fi IDS that used a weighted feature selection technique and neural network algorithm | The proposed method could handle unknown attacks and outperformed the state-of-the-art methods |
Mishra et al. [25] | 2018 | Evaluated different machine learning techniques for IDSs | The performance was increased when C4.5, SVM, neural network, and fuzzy association rules were used |
Mohammadi et al. [26] | 2019 | A feature selection and clustering algorithm which used wrapper and filter approaches | The proposed method produced higher detection and accuracy rates than leading methods in the literature |
Li et al. [27] | 2020 | A feature grouping and selection technique which used deep learning auto-encoder IDS | The presented method outperformed the state-of-the-art methods in terms of detection accuracy, ease of training, and adaptability |
Zhou et al. [28] | 2020 | A feature selection process and ensemble learning techniques | The presented CFS-BA feature selection algorithm outperformed state-of-the-art approaches based on various metrics |
Nancy et al. [29] | 2020 | A wireless sensor networks used dynamic feature selection and fuzzy temporal decision tree classification | The proposed method effectively detected known and unknown intrusions with less energy consumption |
Nazir and Khan [30] | 2021 | A TS-RF that used a wrapper-based feature selection method | The proposed feature selection method improved the accuracy while decreasing the false-positive rates |
Al-Safi et al. [31] | 2021 | A hybrid approach selected the best subset of features | The proposed method generated high accuracy and outperformed other state-of-the-art methods |
Krishnaveni et al. [32] | 2021 | An ensemble feature selection and classification on the cloud environment | A model performance was increased when it was compared with existing methods |
Silvio et al. [33] | 2022 | Metaheuristics-based feature selection model for IDSs | It identified attacks with fewer features |
Prasad et al. [34] | 2022 | Multi-level correlation-based feature selection method analyzed on the UNSW-NB’15 dataset | Its superiority over existing techniques |
Albulayhi et al. [35] | 2022 | Two entropy-based techniques IG and GR | Achieved 99.98% accuracy with fewer features |
Sangaiah et al. [36] | 2023 | A hybrid heuristics artificial feature selection method | It outperformed existing methods with higher accuracy |
Subramani and Selvi [37] | 2023 | Multi-objective feature selection in IoT networks | The performance was increased significantly |
duration |
service |
src_bytes |
dst_bytes |
count |
srv_count |
same_srv_rate |
dst_host_same_srv_rate |
dst_host_rerror_rate |
dst_host_srv_rerror_rate |
min(“normal_duration”)<duration<max(“normal_duration”) | normal | normal |
service=”auth”, count>avg(normal) | attack | dos |
min(“normal_src_bytes”)<src_bytes<max(“normal_src_bytes”) | normal | normal |
service=”efs”, same_srv_rate=1 | attack | probe |
service=”ftp_data”, dst_bytes>max(other_situations) | attack | r2l |
service=”telnet”,max(“normal_duration”)<duration<max(other_situations_duration) | attack | u2r |
service=”ecr_i”, count<=1 | normal | normal |
service=private, duration=0, src_btyes=0, dst_btes=0 | attack | dos |
service=private, duration>max(“normal”), src_btyes=0, dst_btes=0 | attack | probe |
service=eco_i, srv_diff_host_rate=1 | attack | probe |
service=http, src_bytes>max(“normal_src_bytes”) | attack | dos |
service=finger, count>= ort(“normal_count”), dst_host_srv_serror_rate >=0.1 | attack | probe |
service=ssh, src_btyes=0, dst_btes=0 | attack | dos |
service=ftp_data, duration>max(“normal_dur”), dst_host_same_srv_rate=1 | attack | r2l |
service=telnet, count >= avg(“normal_count”), srv_count >= avg(“normal_srv_count”) | attack | u2r |
other situations | normal | normal |
service |
proto |
duration |
sttl |
spkts |
dpkts |
sbytes |
dbytes |
ct_dst_src_ltm |
ct_dst_sport_ltm |
ct_dst_dport_ltm |
sloss |
response_body_len |
sttl>=max(normal_dest_time) & response_body_len>0 | attack |
sttl>=max(normal_dest_time) &ct_dst_src_ltm<min(normal) &sbytes<avg(normal) | attack |
sttl>=max(normal_dest_time)& min(normal)<ct_dst_src_ltm<max(normal) & min(normal)<sbytes | normal |
ct_dst_src_ltm>max(normal)|response_body_len >max(normal) | ct_src_dport_ltm>max(normal) | attack |
service=”dns”, protocol=”udp”, dur > max(“normal_duration”) | attack |
duration=0, spkts>max(normal_spkts) | attack |
service=”-”, protocol=”tcp”, dur< max(“normal_duration”) | normal |
Dur>min(normal) & response_body_len==0 & tcprtt<min(normal) | attack |
Technique | FalsePositive | Precision | F-Measure | Accuracy |
---|---|---|---|---|
FSACM | 0.011 | 99.87 | 99.93 | 99.89 |
NaiveBayes | 0.028 | 97.5 | 90.6 | 86.13 |
DecisionTree | 0.02 | 99.8 | 99.8 | 99.75 |
DecisionTable | 0.08 | 98.7 | 94.65 | 99.50 |
SMO | 0.056 | 91.6 | 61.95 | 96.83 |
AdaBoost | 0.023 | 95.25 | 96.95 | 97.61 |
Technique | Normal | DoS | Probe | U2R | R2L | Detection Rate (%) |
FSACM | 99.90 | 99.91 | 98.67 | 82.54 | 97.0 | |
NaiveBayes | 80.41 | 88.31 | 85.21 | 68.32 | 34.84 | |
DecisionTree | 99.83 | 99.89 | 98.53 | 43.47 | 95.41 | |
DecisionTable | 99.59 | 99.83 | 93.10 | 47.82 | 90.32 | |
SMO | 99.46 | 96.79 | 95.12 | 47.82 | 88.08 | |
AdaBoost | 99.05 | 98.55 | 63.41 | 4.34 | 0.02 |
Technique | False Positive | Precision | F-Measure | Accuracy |
---|---|---|---|---|
FSACM | 0.025 | 97.27 | 97.13 | 98.84 |
Naive Bayes | 0.052 | 80.07 | 74.8 | 71.82 |
Decision Tree | 0.030 | 85.92 | 85.81 | 86.24 |
Decision Table | 0.033 | 82.11 | 81.90 | 82.61 |
SMO | 0.026 | 85.25 | 85.95 | 86.46 |
AdaBoost | 0.280 | 75.15 | 69.45 | 63.13 |
Tech. | Normal | Backd. | Anal. | Fuzz. | Shell. | Recon. | Exp. | DoS | Worm | Gener. | DR(%) |
FSACM | 99.81 | 98.15 | 98.23 | 98.96 | 99.12 | 98.41 | 99.18 | 98.66 | 98.15 | 99.56 | |
N.Bayes | 69.93 | 16.35 | 46.34 | 57.51 | 60.00 | 81.73 | 58.11 | 41.32 | 38.46 | 96.15 | |
D.Tree | 96.81 | 2.88 | 4.64 | 56.93 | 46.96 | 80.7 | 73.38 | 50.79 | 69.23 | 97.94 | |
D.Table | 95.38 | 1.92 | 2.03 | 47.41 | 29.57 | 78.41 | 63.13 | 46.34 | 38.46 | 95.88 | |
SMO | 99.90 | 0.01 | 0.01 | 58.67 | 16.53 | 74.01 | 69.30 | 51.43 | 0.01 | 96.51 | |
AdaB. | 91.59 | 0.01 | 0.01 | 0.01 | 0.01 | 0.01 | 0.01 | 0.01 | 0.01 | 96.17 |
FSACM | Naive Bayes | Decision Tree | Decision Table | AdaBoost | |
---|---|---|---|---|---|
Tuesday Working Hours | 99.87 | 97.15 | 99.68 | 99.18 | 98.97 |
Wednesday Working Hours | 99.63 | 98.8 | 99.49 | 98.86 | 93.51 |
Thursday Working Hours Morning Web Attacks | 99.52 | 94.89 | 99.14 | 99.16 | 98.34 |
Thursday Working Hours Afternoon Infilteration | 99.91 | 97.93 | 99.81 | 99.84 | 99.19 |
Friday Working Hours Morning | 99.88 | 96.46 | 99.83 | 99.82 | 99.23 |
Friday Working Hours Afternoon DDos | 99.89 | 99.78 | 99.89 | 99.85 | 99.57 |
Friday Working Hours Afternoon PortScan | 99.90 | 99.59 | 99.87 | 99.81 | 99.58 |
Paper | Feature Selection | Classification Technique | Num_of Features | Dataset | Accuracy Rate (%) |
---|---|---|---|---|---|
Li et al., 2012 [45] | Feature removal method gradually | SVM | 19 | KDD ’99 | 98.62 |
Karimi et al., 2013 [46] | Hybrid filtering feature selection | Naive Bayes | 16 | KDD ’99 | 98.28 |
Saxena and Richariya 2014 [47] | Standard information gain | Hybrid PSO-SVM Approach | 18 | KDD ’99 | 99.4 |
Dhanabal and Shantharajah 2015 [44] | Correlation-based method | J48, SVM, and Naive Bayes | 6 | KDD ’99 | 98.88, 95.2, 73.32 |
Moustafa and Slay 2016 [48] | Feature correlation | Several machine learning algorithms | 12 | UNSW-NB15 | 85.56 |
Aghdam and Kabiri 2016 [49] | Ant Colony Optimization-based | - | 19 | KDD ’99 | 98.9 |
Hasan et al., 2016 [50] | Higher variable importance score | Random Forest | 25 | KDD ’99 | 91.9 |
Khammassi and Krichen 2017 [43] | GA-LR wrapper approach | C4.5, RF, and NBTree | 18 | KDD ’99 | 99.8, 99.9, 99.85 |
Janarthanan and Zargari 2017 [51] | ARM algorithm | Random Forest | 8 | UNSW-NB15 | 82.99 |
Manzoor and Kumar 2017 [52] | Information gain and correlation | Based on ANN | 25 | KDD ’99 | 97.91 |
Moukhafi et al., 2018 [53] | Particle Swarm Optimization algorithm | Hybrid technique: GA and SVM | 16 | KDD ’99 | 96.38 |
Pham et al., 2018 [54] | Ensemble model | J48 | 35 | KDD ’99 | 84.25 |
Kanimozhi and Jacob 2019 [55] | ARM and CfsSubsetEval | Based on ANN | 5 | UNSW-NB15 | 96.00 |
Chandak et al., 2019 [56] | Ranker- and heuristic- based techniques | C4.5 Decision Tree | 27 | KDD ’99 | 92.98 |
Selvakumar and Muneeswaran [57] | Filter- and wrapper- based method with firefly algorithm | C4.5- and Bayesian Network-based | 10 | KDD ’99 | 90.27 |
Almasoudy et al., 2020 [58] | Differential Evolution Wrapper Feature Selection | Five and binary classification | 9 | KDD ’99 | 80.15, 87.53 |
Kasongo and Sun 2020 [59] | XGBoost-based feature selection | Several machine learning algorithms | 19 | UNSW-NB15 | 90.85 |
Iwendi et al., 2020 [60] | Correlation-based feature selection | Bagging and AdaBoost classifier | 13 | KDD ’99 | 99.4 |
Narayasami et al., 2021 [12] | Bat algorithm | SVM | 25 | KDD ’99 | 94.16 |
Kocher and Kumar 2021 [61] | Hybrid methods: filter and wrapper | Several machine learning algorithms | 23 | UNSW-NB15 | 98.42 |
Ozkan-Okay et al., 2021 [38] | FSAP | SABADT | 17 | KDD ’99 | 99.65 |
Proposed Method FSACM | FSAP new version | SABADT new version | 10/11 | KDD ’99 UNSW-NB15 | 99.89/98.84 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ozkan-Okay, M.; Samet, R.; Aslan, Ö.; Kosunalp, S.; Iliev, T.; Stoyanov, I. A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Appl. Sci. 2023, 13, 11067. https://doi.org/10.3390/app131911067
Ozkan-Okay M, Samet R, Aslan Ö, Kosunalp S, Iliev T, Stoyanov I. A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Applied Sciences. 2023; 13(19):11067. https://doi.org/10.3390/app131911067
Chicago/Turabian StyleOzkan-Okay, Merve, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev, and Ivaylo Stoyanov. 2023. "A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications" Applied Sciences 13, no. 19: 11067. https://doi.org/10.3390/app131911067
APA StyleOzkan-Okay, M., Samet, R., Aslan, Ö., Kosunalp, S., Iliev, T., & Stoyanov, I. (2023). A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Applied Sciences, 13(19), 11067. https://doi.org/10.3390/app131911067