Abstract

Every day, millions of people in many institutions communicate with each other on the Internet. The past two decades have witnessed unprecedented levels of Internet use by people around the world. Almost alongside these rapid developments in the internet space, an ever increasing incidence of attacks carried out on the internet has been consistently reported every minute. In such a difficult environment, Anomaly Detection Systems (ADS) play an important role in monitoring and analyzing daily internet activities for security breaches and threats. However, the analytical data routinely generated from computer networks are usually of enormous size and of little use. This creates a major challenge for ADSs, who must examine all the functionality of a certain dataset to identify intrusive patterns. The selection of features is an important factor in modeling anomaly-based intrusion detection systems. An irrelevant characteristic can lead to overfitting which in turn negatively affects the modeling power of classification algorithms. The objective of this study is to analyze and select the most discriminating input characteristics for the construction of efficient and computationally efficient schemes for an ADS. In the first step, a heuristic algorithm called IG-BA is proposed for dimensionality reduction by selecting the optimal subset based on the concept of entropy. Then, the relevant and meaningful features are selected, before implementing Number of Classifiers which includes: (1) An irrelevant feature can lead to overfitting which in turn negatively affects the modeling power of the classification algorithms. Experiment was done on CICIDS-2017 dataset by applying (1) Random Forest (RF), (2) Bayes Network (BN), (3) Naive Bayes (NB), (4) J48 and (5) Random Tree (RT) with results showing better detection precision and faster execution time. The proposed heuristic algorithm outperforms the existing ones as it is more accurate in detection as well as faster. However, Random Forest algorithm emerges as the best classifier for feature selection technique and scores over others by virtue of its accuracy in optimal selection of features.

Highlights

  • Millions of people in various organizations across continents communicate with each other on the Internet

  • Experimental results The proposed feature selection information gain (IG)-Bat Algorithm (BA) hybrid method applied initially and result subset with important features and classification algorithms applied over the data with the benchmarks which includes (i) The True Positive Rate (TPR),(ii) The False Rates Positive (FPR), (iii) Precision, and (iv) Recall are used

  • Subset of features selected from Hybrid IG-BA method 8

Read more

Summary

Introduction

Millions of people in various organizations across continents communicate with each other on the Internet. The past two decades have seen an exponential increase in the number of people using the Internet. 4 billion users worldwide currently use the Internet [3]. An intrusion detection system (IDS) monitors network traffic to identify malicious events or privacy breaches and alerts a monitoring station or initiates preventative action against a detected threat.

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call