Skip navigation
Skip navigation

Using feature selection for intrusion detection system

Alazab, Ammar; Hobbs, Michael; Abawajy, Jemal; Alazab, Mamoun

Description

A good intrusion system gives an accurate and efficient classification results. This ability is an essential functionality to build an intrusion detection system. In this paper, we focused on using various training functions with feature selection to achieve high accurate results. The data we used in our experiments are NSL-KDD. However, the training and testing time to build the model is very high. To address this, we proposed feature selection based on information gain, which can contribute...[Show more]

dc.contributor.authorAlazab, Ammar
dc.contributor.authorHobbs, Michael
dc.contributor.authorAbawajy, Jemal
dc.contributor.authorAlazab, Mamoun
dc.coverage.spatialGold Coast Australia
dc.date.accessioned2015-12-13T22:22:52Z
dc.date.createdOctober 2-5 2012
dc.identifier.isbn9781467311571
dc.identifier.urihttp://hdl.handle.net/1885/72489
dc.description.abstractA good intrusion system gives an accurate and efficient classification results. This ability is an essential functionality to build an intrusion detection system. In this paper, we focused on using various training functions with feature selection to achieve high accurate results. The data we used in our experiments are NSL-KDD. However, the training and testing time to build the model is very high. To address this, we proposed feature selection based on information gain, which can contribute to detect several attack types with high accurate result and low false rate. Moreover, we performed experiments to classify each of the five classes (normal, probe, denial of service (DoS), user to super-user (U2R), and remote to local (R2L). Our proposed outperform other state-of-art methods.
dc.publisherIEEE Communications Society
dc.relation.ispartofseriesInternational Symposium on Communications and Information Technologies (ISCIT 2012)
dc.source.urihttp://www.iscit2012.org/
dc.subjectKeywords: Classification results; Denial of Service; Information gain; Intrusion Detection Systems; security; State-of-art methods; Training and testing; Training function; Computer crime; Experiments; Feature extraction; Information technology; Websites; Intrusion Anomaly base detection; Feature selection; Intrusion detection; security
dc.titleUsing feature selection for intrusion detection system
dc.typeConference paper
local.description.notesImported from ARIES
local.description.refereedYes
dc.date.issued2012
local.identifier.absfor160201 - Causes and Prevention of Crime
local.identifier.absfor160206 - Private Policing and Security Services
local.identifier.ariespublicationU3488905xPUB3274
local.type.statusPublished Version
local.contributor.affiliationAlazab, Ammar, Deakin University
local.contributor.affiliationHobbs, Michael, Deakin University
local.contributor.affiliationAbawajy, Jemal , Deakin University
local.contributor.affiliationAlazab, Mamoun, College of Asia and the Pacific, ANU
local.description.embargo2037-12-31
local.bibliographicCitation.startpage296
local.bibliographicCitation.lastpage301
local.identifier.doi10.1109/ISCIT.2012.6380910
dc.date.updated2016-02-24T10:04:43Z
local.identifier.scopusID2-s2.0-84872150200
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Alazab_Using_feature_selection_for_2012.pdf393.23 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator