Abstract
As Internet networks expand, the amount of network threats and intrusions increased, the demand for an efficient and reliable defense system is required to detect network security vulnerabilities. Intrusion Detection Systems (IDS) are a vital constituent of security of a network to avert data illegal usage and misappropriation. IDS deal with massive amount of data movement that comprises repetitive and inappropriate features. The detection rate implementation is frequently affected by these inappropriate features which also munch up intrusion detection system resources. A significant portion in the removal of dissimilar and not used features in IDS is done by the feature selection method. Methods included are data mining techniques, machine learning, statistical analysis, support vector machine models and neural networks. In this paper, we provide review of several algorithms used for anomaly-based intrusion detection systems to improve performance of machine learning classifiers. This paper first summarizes the theoretical basis of IDS, and then discusses the feature selection techniques and their types.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Ani, A.K., Anbar, M., Manickam, S., Al-Ani, A., Leau, Y.-B.: Proposed DAD-match mechanism for securing duplicate address detection process in IPv6 link-local network based on symmetric-key algorithm. In: International Conference on Computational Science and Technology, pp. 108–118 (2017)
Al-Ani, A.K., Anbar, M., Manickam, S., Al-Ani, A., Leau, Y.-B.: Proposed DAD-match security technique based on hash function to secure duplicate address detection in IPv6 link-local network. In: Proceedings of the 2017 International Conference on Information Technology, pp. 175–179 (2017)
Kim, D.S., Nguyen, H.-N., Ohn, S.-Y., Park, J.S.: Fusions of GA and SVM for anomaly detection in intrusion detection system. In: International Symposium on Neural Networks, pp. 415–420 (2005)
Dastanpour, A., Ibrahim, S., Mashinchi, R.: Using genetic algorithm to supporting artificial neural network for intrusion detection system. In: The International Conference on Computer Security and Digital Investigation (ComSec 2014), pp. 1–13 (2014)
Anbar, M., Abdullah, R., Al-Tamimi, B.N., Hussain, A.: A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks. Cognit. Comput. 10, 1–14 (2017)
Vithalpura, J.S., Diwanji, H.M.: Analysis of fitness function in designing genetic algorithm based intrusion detection system. Int. J. Sci. Res. Dev. 3, 86–92 (2015)
Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. Computer (Long. Beach. Calif.) 35, 27–30 (2002)
Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36, 16–24 (2013)
Shahreza, M.L., Moazzami, D., Moshiri, B., Delavar, M.R.: Anomaly detection using a self-organizing map and particle swarm optimization. Sci. Iran. 18, 1460–1468 (2011)
Anbar, M., Abdullah, R., Saad, R., Hasbullah, I.H.: Review of preventive security mechanisms for neighbour discovery protocol. Adv. Sci. Lett. 23, 11306–11310 (2017)
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18–28 (2009)
Kumar, K., Kumar, G.: Analysis of feature selection techniques: a data mining approach. International Journal of Computer Applications (0975 – 8887), 4th International Conference on Engineering & Technology (ICAET 2016) pp. 17–21
Kumari, B., Swarnkar, T.: Filter versus wrapper feature subset selection in large dimensionality micro array: a review 2(3), 1048–1053 (2011)
Binitha, S., Sathya, S.S., et al.: A survey of bio inspired optimization algorithms. Int. J. Soft Comput. Eng. 2, 137–151 (2012)
Bolón-Canedo, V., Sánchez-Maroño, N., Alonso-Betanzos, A.: A review of feature selection methods on synthetic data. Knowl. Inf. Syst. 34, 483–519 (2013)
Ahmad, I., Abdullah, A., Alghamdi, A., Alnfajan, K., Hussain, M.: Intrusion detection using feature subset selection based on MLP. Sci. Res. Essays 6, 6804–6810 (2011)
Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)
Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27, 1669–1676 (2016)
Alomari, O., Othman, Z.A.: Bees algorithm for feature selection in network anomaly detection. J. Appl. Sci. Res. 8, 1748–1756 (2012)
Xingzhu, W.: ACO and SVM selection feature weighting of network intrusion detection method. Analysis 9, 129–270 (2015)
Rani, M.S., Xavier, S.B.: A hybrid intrusion detection system based on C5.0 decision tree and one-class SVM. Int. J. Curr. Eng. Technol. 5, 2001–2007 (2015)
Ghanem, W.A.H.M., Jantan, A.: Novel multi-objective artificial bee colony optimization for wrapper based feature selection in intrusion detection. Int. J. Adv. Soft Comput. Appl. 8, 70–81 (2016)
Acharya, N., Singh, S.: An IWD-based feature selection method for intrusion detection system. Soft Comput. 22, 1–10 (2017)
Ganapathy, S., Vijayakumar, P., Yogesh, P., Kannan, A.: An intelligent CRF based feature selection for effective intrusion detection. Int. Arab J. Inf. Technol. 13, 44–50 (2016)
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39, 424–430 (2012)
Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65, 2986–2998 (2016)
Madbouly, A.I., Barakat, T.M.: Enhanced relevant feature selection model for intrusion detection systems. Int. J. Intell. Eng. Inform. 4, 21–45 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alamiedy, T.A., Anbar, M., Al-Ani, A.K., Al-Tamimi, B.N., Faleh, N. (2019). Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-99007-1_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99006-4
Online ISBN: 978-3-319-99007-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)