Open Access Open Access  Restricted Access Subscription or Fee Access

A Hybrid Approach for Feature Selection in Improving the Efficiency of Wireless Intrusion Detection Systems

Dr. K. Selva Kumar, R. Saminathan, S. Suganthi

Abstract


Intrusions are the result of flaws in the design and implementation of computer systems, operating systems, applications, and communication protocols. An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a management station. In anomaly detection models, classifier is used as detectors. While constructing the classifier selection of the best set of the features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features. This paper proposes a novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions. Our model uses the Information Gain Ratio and K-Means classifier to compute and improve the accuracy of classifier. Experimental results clearly show that the optimization of a wireless feature set has a significant impact on the efficiency and accuracy of the intrusion detection system.

Keywords


Intrusions, 802.11 Vulnerabilities, Intrusion Detection System, Classifier, Feature reduction, K-Means, Information Gain Ratio.

Full Text:

PDF

References


Teerawat Issariyakul, Ekram Hossain, ―Introduction to Network Simulator NS2‖, Springer, 2009.

Boukerche, R.B. Machado, K.R.L. Juca´ , J.B.M. Sobral, and M.S.M.A. Notare, ―An Agent Based and Biological Inspired Real-Time Intrusion Detection and Security Model for Computer Network Operations,‖ Computer Comm., vol. 30, no. 13, pp. 2649- 2660, Sept. 2007.

Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, ―An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems,‖ Parallel Computing, vol. 30, nos. 5/6, pp. 629-646, 2004.

Boukerche and M.S.M.A. Notare, ―Behavior-Based Intrusion Detection in Mobile Phone Systems,‖ J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.

Y. Chen, Y. Li, X. Cheng, and L. Guo, ―Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System,‖ Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.

H. Liu and H. Motoda, ―Feature Selection for Knowledge Discovery and Data Mining‖. Kluwer Academic, 1998.

Bittau, M. Handley, and J. Lackey, ―The Final Nail in WEP’s Coffin,‖ Proc. IEEE Symp. Security and Privacy, May 2006.

A.H. Sung and S. Mukkamala, ―The Feature Selection and Intrusion Detection Problems,‖ Proc. Ninth Asian Computing Science Conf., 2004.

A.H. Sung and S. Mukkamala, ―Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks,‖ Proc. Symp. Applications and the Internet (SAINT ’03), Jan. 2003.

G. Stein, B. Chen, A.S. Wu, and K.A. Hua, ―Decision Tree Classifier for Network Intrusion Detection with GA-Based Feature Selection,‖ Proc. 43rd ACM Southeast Regional Conf.—Volume 2, Mar. 2005.

Hofmann, T. Horeis, and B. Sick, ―Feature Selection for Intrusion Detection: An Evolutionary Wrapper Approach,‖ Proc. IEEE Int’l Joint Conf. Neural Networks, July 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.