Feature Selection Approach For Intrusion Detection System Based On Pollination Algorithm
Feature Selection Approach For Intrusion Detection System Based On Pollination Algorithm
ABSTRACT
An intrusion detection system refers to the systems
which detect the security breaches in a network. The
main goal of IDS is to detect the attacks and raise alarms
if an attack is found. These IDS has limitation of raising
false alarms and this limitation depends on improper
classification of attacks due to high dimensionality of
data on a network. Improper classification is due to
improper feature selection. To overcome this limitation,
optimization of feature selection technique is proposed
in this paper. Pollination based optimization technique is
proposed which eventually improves feature selection in
high dimensional data of IDS and achieve reduction in
false alarms.
Keywords - Classification, False
dimensionality, IDS, Pollination.
I.
alarms,
High
INTRODUCTION
II.
LITERATURE SURVEY
1. Feature Selection
www.ijaert.org
www.ijaert.org
6.
J48 Classifier
III.
PROPOSED METHODOLOGY
www.ijaert.org
IV.
RESULTS
www.ijaert.org
V.
REFERENCES
[1] Mr. Ketan Sanjay Desale, and Ms. Roshani Ade, Genetic
Algorithm based Feature Selection Approach for Effective
Intrusion Detection System, International Conference on
Computer Communication and Informatics (ICCCI -2015),
Jan. 08 10, 2015, Coimbatore, INDIA.
[2] Amanpreet Chauhan, Gaurav Mishra, Gulshan Kumar,
Survey on Data Mining Techniques in Intrusion Detection,
International Journal of Scientific & Engineering Research
Volume 2, Issue 7, July-2011.
[3] M. Ramaswami and R. Bhaskaran, A Study on Feature
Selection Techniques in Educational Data Mining, Journal of
computing, volume 1, issue 1, Dec 2009, ISSN: 2151-9617
[4] Long-Sheng Chen, Jhih-Siang Syu., Feature extraction
based approaches for improving the performance of intrusion
detection systems, International MultiConference of
Engineers and Computer Scientists 2015 Vol I, IMECS 2015,
March 18 - 20, 2015, Hong Kong.
[5] Dr. Saurabh Mukherjee, Neelam Sharma, Intrusion
Detection using Naive Bayes Classifier with Feature
Reduction, 2011.
[6] Hee-su Chae, Byung-oh Jo, Sang-Hyun Choi, Twae-kyung
Park, Feature Selection for Intrusion Detection using NSLKDD, Recent Advances in Computer Science, pp.- 184-187.
[7] Ayman I. Madbouly, Amr M. Gody, Tamer M. Barakat,
Relevant Feature Selection Model Using Data Mining for
Intrusion Detection System,
International Journal of
Engineering Trends and Technology (IJETT) Volume 9
Number 10 - Mar 2014.
[8] Ayman I. Madbouly, Tamer M. Barakat, Enhanced
Relevant Feature Selection Model for Intrusion Detection
Systems.
[9] L.Dhanabal1, Dr. S.P. Shantharajah, A Study on NSLKDD Dataset for Intrusion Detection System Based on
Classification Algorithms, International Journal of Advanced
Research in Computer and Communication Engineering
Vol. 4, Issue 6, June 2015.
[10] Iztok Fister Jr.1, Xin-She Yang2, Iztok Fister1, Janez
Brest1, Dusan Fister, A Brief Review of Nature-Inspired
Algorithms for Optimization.
[11] Seyed Mojtaba Hosseini Bamakan.a,b, Behnam Amiric,
Mahboubeh Mirzabagherib, Yong Shi, A New Intrusion
Detection Approach using PSO based Multiple Criteria Linear
Programming, Procedia Computer Science55 (2015) 231237.
[12] Adel Sabry EESA, Zeynep orman, Adnan Mohsin
Abdulazeez brifcani, A new feature selection model based on
ID3 and bees algorithm for intrusion detection system, Turkish
Journal of Electrical Engineering & Computer Sciences.
[13] Xin-She Yang, Flower Pollination Algorithm for Global
Optimization.
[14] Shikha Agrawal, Jitendra Agrawal, Survey on Anomaly
Detection using Data Mining Techniques, 19th International
Conference on Knowledge Based and Intelligent Information
and Engineering Systems.
[15] Gaganjot Kaur, Amit Chhabra, Improved J48
Classification Algorithm for the Prediction of Diabetes,
International Journal of Computer Applications (0975 8887)
Volume 98 No.22, July 2014.
www.ijaert.org