A Study on the Feature Selection of Network Traffic for intrusion Detection Purpose

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    12 Citations (Scopus)
    5 Downloads (Pure)

    Abstract

    The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of the dataset into 4 groups: Group I contains the basic network traffic features; Group II is actually not network traffic related, but the features collected from hosts; Group III and IV are temporally aggregated features. In this paper, we demonstrate the different detection rates of choosing the different combinations of these groups. We also demonstrate the effectiveness and the ineffectiveness in finding anomalies by looking at the network data alone. In addition, we also briefly investigate the effectiveness of data normalization. To validate our findings, we conducted the same experiments with 3 different clustering algorithms - K-means clustering, fuzzy C means clustering (FCM), and fuzzy entropy clustering (FE).
    Original languageEnglish
    Title of host publicationProceedings of the IEEE Intelligence and Security Informatics Conference 2008 (ISI 2008)
    EditorsC Yang, W Chen, W Hsu, T Wu
    Place of PublicationUnited States
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages245-247
    Number of pages3
    ISBN (Print)9781424424146
    DOIs
    Publication statusPublished - 2008
    EventIEEE Intelligence and Security Informatics Conference 2008 (ISI 2008) - Taipei, Taiwan, Province of China
    Duration: 17 Jun 200820 Jun 2008

    Conference

    ConferenceIEEE Intelligence and Security Informatics Conference 2008 (ISI 2008)
    CountryTaiwan, Province of China
    CityTaipei
    Period17/06/0820/06/08

    Fingerprint Dive into the research topics of 'A Study on the Feature Selection of Network Traffic for intrusion Detection Purpose'. Together they form a unique fingerprint.

  • Cite this

    Ma, W., Tran, D., & Sharma, D. (2008). A Study on the Feature Selection of Network Traffic for intrusion Detection Purpose. In C. Yang, W. Chen, W. Hsu, & T. Wu (Eds.), Proceedings of the IEEE Intelligence and Security Informatics Conference 2008 (ISI 2008) (pp. 245-247). IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ISI.2008.4565069