CFP last date
20 December 2024
Reseach Article

An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier

by Abdur Rahman Onik, Nutan Farah Haq, Lamia Alam, Tauseef Ibne Mamun
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 13
Year of Publication: 2015
Authors: Abdur Rahman Onik, Nutan Farah Haq, Lamia Alam, Tauseef Ibne Mamun
10.5120/ijca2015905706

Abdur Rahman Onik, Nutan Farah Haq, Lamia Alam, Tauseef Ibne Mamun . An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier. International Journal of Computer Applications. 124, 13 ( August 2015), 1-8. DOI=10.5120/ijca2015905706

@article{ 10.5120/ijca2015905706,
author = { Abdur Rahman Onik, Nutan Farah Haq, Lamia Alam, Tauseef Ibne Mamun },
title = { An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 13 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number13/22161-2015905706/ },
doi = { 10.5120/ijca2015905706 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:16.619096+05:30
%A Abdur Rahman Onik
%A Nutan Farah Haq
%A Lamia Alam
%A Tauseef Ibne Mamun
%T An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 13
%P 1-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The feature selection approach provides improved prediction and minimizes the computation time. Due to the higher numbers of features the understanding of the data in pattern recognition becomes difficult sometimes. That’s why researchers have used different feature selection techniques with the single classifiers in their intrusion detection system to build up a model which gives a better accuracy and prediction performance. In this paper, we provide a comparative analysis with the feature selection approach in WEKA machine learning tool using the J48 classifier. The research work show the comparison of the performance of single J48 classifier with filter methods. The prediction performance may differ marginally in some cases but with the removal of irrelevant features time complexity can be easily ignored and a better prediction rate is guaranteed.

References
  1. Adel Sabry Eesa , Zeynep and Brifcani (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems in Expert Systems with Applications. Volume 42, Issue 5, Pages 2670-2679.
  2. Akhilesh Kumar Shrivas, Amit Kumar D, (2014). "An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set." International Journal of Computer Applications.
  3. Amin Dastanpour, Raja Azlina, (2013). "Feature Selection Based on Genetic Algorithm and Support Vector Machine for Intrusion Detection System." The Society of Digital Information and Wireless Communications (SDIWC).
  4. Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713–722.
  5. Dr. Neeraj Bhargava, Girja Sharma and Dr. Ritu Bhargava,(2013),"Decision Tree Analysis on J48 Algorithm for Data Mining", IJARCSSE, Volume 3, Issue 6, June 2013 .
  6. Girish Chandrashekar, Ferat Sahin, (2014),A survey on feature selection methods in Computers and Electrical Engineering archive, Volume 40, Issue 1, January, 2014 , Pages 16-28.
  7. Hee-su Chae, Byung-oh Jo,Sang-Hyun Choi and Twae-kyung Park (2015) , "Feature Selection for Intrusion Detection using NSL-KDD", Recent Advances in Computer Science, ISBN: 978-960-474-354-4.
  8. Hou, Yung-Tsung, et al. "Malicious web content detection by machine learning." Expert Systems with Applications 37.1 (2010): 55-60.
  9. Law MH, Figueiredo M rio AT, Jain AK. (2004). Simultaneous feature selection and clustering using mixture models in IEEE Trans Pattern Anal Mach Intell, Volume 26, Issue 9, September, 2004, Pages :1154-66.
  10. Levent Koc, Thomas A. Mazzuchi and Shahram Sarkani,(2012),A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier in Expert Systems with Applications , Volume 39, Issue 18, Pages 13492-13500.
  11. Lin, S.-W., Ying, K.-C., Lee, C.-Y., & Lee, Z.-J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10), 3285–3290.
  12. Mohanabharathi, R., Kalaikumaran, T., & Karthi, S. (2012). Feature selection for wireless intrusion detection system using filter and wrapper model in International Journal of Modern Engineering Research (IJMER), 2(4), 1552–1556.
  13. Nutan Farah Haq, Abdur Rahman Onik, (2015). "Application of Machine Learning Approaches in Intrusion Detection System: A Survey." (IJARAI) International Journal of Advanced Research in Artificial Intelligence.
  14. Rupali Datti, Shilpa Lakhina (2012), “Performance Comparison of Feature Reduction Techniques For Intrusion Detection Systems”, Dated: 10-02-2012, International Journal of Computer Science and Technology, IJCST, ISSN : 0976-8491, Volume 3, Issue 1.
  15. S. Devaraju, S. Ramakrishnan. "DETECTION OF ACCURACY FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK CLASSIFIER." International Journal of Emerging Technology and Advanced Engineering(IJETAE).
  16. Su, Ming-Yang, (2011). "Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers." Expert Systems with Applications 38.4 : 3492-3498.
  17. Yang Yi, Jiansheng Wu (2011). "Incremental SVM based on reserved set for network intrusion detection." expert systems with applications,ELSEVIER.
  18. Yinhui Li, Jingbo Xia (2012). "An efficient intrusion detection system based on support vector machines and." expert systems with applications,ELSEVIER.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Feature Selection Decision Tree WEKA Filter Method Wrapper Method.