We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection using Feature Selection

by Rupali Malviya, Brajesh K. Umrao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 2
Year of Publication: 2014
Authors: Rupali Malviya, Brajesh K. Umrao
10.5120/18886-0165

Rupali Malviya, Brajesh K. Umrao . Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection using Feature Selection. International Journal of Computer Applications. 108, 2 ( December 2014), 35-38. DOI=10.5120/18886-0165

@article{ 10.5120/18886-0165,
author = { Rupali Malviya, Brajesh K. Umrao },
title = { Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection using Feature Selection },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 2 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number2/18886-0165/ },
doi = { 10.5120/18886-0165 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:59.130704+05:30
%A Rupali Malviya
%A Brajesh K. Umrao
%T Comparison of NBTree and VFI Machine Learning Algorithms for Network Intrusion Detection using Feature Selection
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 2
%P 35-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of computer networks is of great importance. But, with the proliferation of electronic devices and the internet, there has been an exponential rise in malicious activities. The security perpetrators take the advantage of the intricacy of the internet and carry out intrusions. There have been certain researches to find out solutions for detecting intrusions. In this paper, the research has been the application of machine learning techniques to the field of network intrusion detection. Machine learning techniques can learn normal and anomalous patterns from training data and generate classifiers which can be used to detect intrusions in a network. The machine learning techniques used are Naïve Bayes Tree algorithm and the Voting Feature Intervals algorithm. Also, Feature Selection Methods to improve the performance of these algorithms were used because the input to classifiers is in a high dimension feature space, but all features available are not relevant for classification. Two approaches were taken into consideration for feature selection, Chi Square and Gain Ratio. Using these feature selection approaches a comparative study of the two algorithms NBTree and VFI as classifiers has been done. The NSL-KDD data set has been used to train and test the classifiers.

References
  1. Doak. 1992. An evaluation of feature selection methods and their application to computer security, Technical report, DavisCA: University of California, Department of Computer Science.
  2. Pat Langley, Wayne Iba, Kevin Thompson. 1992. An analysis of bayesian classifiers. National Conference on Artificial Intelligence, 223–228.
  3. Ross R. Quinlan. 1993. C4. 5: programs for machine learning. Morgan Kaufmann Publishers Inc.
  4. Ron Kohavi. 1996. Scaling up the accuracy of Naive-Bayes classifiers: a decision-tree hybrid, In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, 202–207.
  5. Blum and P Langley. 1997. Selection of relevant features and examples in machine learning, Artificial Intelligence, 97(1-2):245–271.
  6. Gulsen Demiroz, H. Altay Guvenir. 1997. Classification by voting feature intervals, In European Conference on Machine Learning, 85–92.
  7. M Dash, H Liu. 1997. Feature Selection for Classification, Intelligent Data Analysis: An International Journal, vol. 1, no. 3,131-156.
  8. R Kohavi and G H John. 1997. Wrapper for Feature Subset Selection, Artificial Intelligence, vol. 97, 273-324.
  9. A. K Jones, R S Sielken. 2000. Computer system intrusion detection: A survey.
  10. Eric Bloedorn et al. 2001. Data Mining for Network Intrusion Detection: How to get started.
  11. Isabelle Guyon, Andr´e Elisseeff. 2003. An Introduction to Variable and Feature Selection, Journal of Machine Learning Research, Vol. 3, 1157-1182.
  12. D. W?odzis?aw, W. Tomasz, B. Jacek, K. Adam. 2003. Feature Selection and Ranking Filters.
  13. Gary Stein, Bing Chen, Annie S Wu, Kein A Hua. 2005. Decision tree classifier for network intrusion detection with GA based feature selection, Proceedings of the 43rd ACM Annual Southeast Conference, Kennesaw, Georgia, Vol 2.
  14. Ian H Witten, Eibe Frank. 2005. Data Mining Practical Machine Learning Tools and Techniques, Second Edition, Morgan Kaufmann.
  15. Marco Barreno,Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar. 2006. Can machine learning be secure? In asiaccs '06: 46 proceedings of the 2006 acm symposium on information, computer And communications security, ACM Press, 16–25.
  16. Sandeep V. Sabnani. 2008. Computer Security: A Machine Learning Approach, Technical Report, MSc in Information Security at Royal Holloway, University of London.
  17. M. Tavallaee, E. Bagheri, W. Lu, A. Ghorbani. 2009. A Detailed Analysis of the KDD CUP 99 Data Set, Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
  18. Xiaofeng Liao, Liping Ding,Yongji Wang. 2011. Secure Machine Learning, A Brief Overview, Fifth International Conference on Secure Software Integration and Reliability Improvement – Companion.
  19. Shina Sheen, R. Rajesh. 2008. Network intrusion detection using feature selection and decision tree classifier. TENCON 2008 IEEE conference.
  20. Jiawei Han, Micheline Kamber. 2006. Data Mining: Concepts and Techniques, Harcourt India Pvt Ltd.
  21. Weka Machine Learning Project.
  22. Nsl-kdd data set for network-based intrusion detection systems. Available on: http://nsl. cs. unb. ca/NSL-KDD.
  23. K. Stroeh, E. R. M. Madeira, S. K. Goldenstein. 2013. An approach to the correlation of security events based on machine learning techniques. Journal of Internet services and Applications. doi 10. 1186 /1869-0238-4-7
Index Terms

Computer Science
Information Sciences

Keywords

Machine learning NBTree VFI Feature selection Chi Square Gain Ratio.