Published November 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Hybrid Sequential Feature Selection With Ensemble Boosting Class-based Classification Method

  • 1. Research Scholar, Department of Computer Science, Erode Arts and Science College, (Autonomous), Erode (Tamil Nadu), India.
  • 2. Associate Professor (Rtd), Department of Computer Science, Erode Arts and Science College (Autonomous), Erode (Tamil Nadu), India.

Contributors

Contact person:

  • 1. Research Scholar, Department of Computer Science, Erode Arts and Science College, (Autonomous), Erode (Tamil Nadu), India.

Description

Abstract: The rapid rise in hacking and computer network assaults throughout the world has highlighted the need for more effective intrusion detection and prevention solutions. The intrusion detection system (IDS) is critical in identifying abnormalities and assaults on the network, which have grown in size and scope. IDS prevents intruders from gaining access to information in the field of network security as a result. The use of IDS is critical for detecting various types of attacks. Because the network traffic dataset contains a large number of features, the process of selecting and removing irrelevant features improves the accuracy of the classification algorithms. For the fact that a large dimension allows us to include more data, the feature vector can be built by combining different types of features. Contains a lot of redundant or irrelevant data can cause confusion. Over-fitting issues and a decrease in the generalization capacity of the model. Solving such a problem necessitates a sequence of feature selection methods the boosted maximum relevance maximum distance (BMRMD) method can report on the contribution of each feature as well as the predictive accuracy based on the best feature set. As a result, the best features in this study were chosen using the BMRMD assesses feature redundancy to determine feature relevance to the target class based on optimum ensemble feature classification

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

D72981111422.pdf

Files (603.6 kB)

Name Size Download all
md5:27b482bf82b940e6b66448a69abb149c
603.6 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

References

  • Ahmed Mahfouz , Abdullah Abuhussein , Deepak Venugopal and Sajjan Shiva "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset", Future Internet 12, 180, pp 1-19,2020.
  • Alsaadi H. I., Almuttairi R. M., Bayat O., and Ucani O. N., "Computational intelligence algorithms to handle dimensionality reduction for enhancing intrusion detection system," Journal of Information Science and Engineering, vol. 36, no. 2, pp. 293–308, 2020.
  • Azeez, N.A.; Bada, T.M.; Misra, S.; Adewumi, A.; Van Der Vyver, C.; Ahuja, R. Intrusion Detection and Prevention Systems: An Updated Review; Springer Science and Business Media LLC: Berlin, Germany, pp. 685–696, 2019.
  • BalaGanesh, D., Chakrabarti, A., Midhun chakkaravarthy D., Smart Devices Threats, Vulnerabilities and Malware Detection Approaches: A Survey. European Journal of Engineering Research and Science. 3, 7–12,2018.
  • Gao X., Shan C., Hu C., Niu C, and Liu Z., "An Adaptive Ensemble Machine Learning Model for Intrusion Detection," IEEE Access, vol. 7, pp. 82512–82521, 2019.
  • Hasanin, T.; Khoshgoftaar, T.M.; Leevy, J.L.; Seliya, N. Investigating Random Undersampling and Feature Selection on Bioinformatics Big Data. In Proceedings of the 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService), New York, CA, USA, 4–9,pp. 346–356, 2019.
  • Hatef M. A., Shaker V., Jabbarpour M. R., Jung J., and Zarrabi H., "HIDCC: A hybrid intrusion detection approach in cloud computing," Concurrency and Computation, vol. 30, no. 3, 2018.
  • Janarthanam S, Prakash N, Shanthakumar M, Adaptive learning method for DDoS attacksoftware-definedfined network function virtualization, EAI Endorsed Transactions on Cloud Systems, Vol.6, Issue 18, pp1-8,2020.
  • Jose S., Malathi D., Reddy B., and Jayaseeli D., "A Survey on Anomaly Based Host Intrusion Detection System," Journal of Physics: Conference Series - IOPscience., vol. 1000, no. 1, 2018.
  • Khraisat A, Gondal I., Vamplew P., Kamruzzaman J., and Alazab A., "Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine," Electron., vol. 9, no. 1, 2020.
  • Khraisat A, Gondal I., Vamplew P., Kamruzzaman J., and Alazab A., "Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine," Electron., vol. 9, no. 1, 2020.
  • Maldonado S. and Weber R., "A wrapper method for feature selection using support vector machines," Information Sciences, vol. 179, no. 13, pp. 2208–2217, 2009.
  • Moayedikia A., Ong K. L., Boo Y. L., Yeoh W. G., and Jensen R., "Feature selection for high dimensional imbalanced class data using harmony search," Journal of Engineering Applications of Artificial Intelligence, vol. 57, pp. 38–49, Jan. 2017.
  • Mohammad Pirhooshyaran, Katya Scheinberg, and Lawrence V Snyder. Feature engineering and forecasting via derivative-free optimization and ensemble of sequence-to-sequence networks with applications in renewable energy. Energy, page 117-136, 2020.
  • Muna A.-H., Moustafa N., and Sitnikova E., ``Identification of malicious activitiethe s in the industrial Internet of Things based on deep learning models,'' Journal of Information Security and Applications., vol. 41, pp. 1-11, Aug. 2018.
  • Park K, Song Y., and Cheong Y. G., "Classification Of Attack Types For Intrusion Detection Systems Using A Machine Learning Algorithm," Proc. - IEEE 4th Int. Conf. Big Data Computer Service Applications BigDataService 2018, pp. 282–286, 2018.
  • Samadi Bonab M., Ghaffari A., Soleimanian Gharehchopogh F., and Alemi P., "A wrapper-based feature selection for improthe ving performance of intrusion detection systems," International Journal of Communication Systems., vol. 33, no. 12, pp. 1–25, 2020.
  • Seo, J.-H.; Kim, Y.-H. Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection. Computational Intelligence and Neuroscience, pp1–11,2018.
  • Singh, R., Kumar, H., Singla, R.K., Ramkumar, K. Internet attacks and intrusion detection system. Online Information Review, 41, 171–184, 2017.
  • Zhao, Feng & Zhang, Hao & Peng, Jia & Zhuang, Xiaohong & Na, Sang-Gyun. "A semi-self-taught network intrusion detection system". Neural Computing and Applications. 32. www.doi.org/10.1007/s00521-020-04914-7, 2020.

Subjects

ISSN: 2277-3878 (Online)
https://portal.issn.org/resource/ISSN/2277-3878
Retrieval Number: 100.1/ijrte.D72981111422
https://www.ijrte.org/portfolio-item/d72981111422/
Journal Website: www.ijrte.org
https://www.ijrte.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/