Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks
International Journal of Engineering Trends and Technology (IJETT) | |
|
© 2013 by IJETT Journal | ||
Volume-6 Number-5 |
||
Year of Publication : 2013 | ||
Authors : Jashuva.Chundi , V.V.Gopala Rao |
Citation
Jashuva.Chundi , V.V.Gopala Rao. "Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks". International Journal of Engineering Trends and Technology (IJETT). V6(5):241-246 Dec 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Although of the widespread use of the WLANs, it is still vulnerable for the availability security issues. This research presents a proposal Wireless Network Intrusion Detection System (WNIDS) which is use misuse and anomaly techniques in intrusion detection. The proposal depend on Data mining is a DM-based WNIDS since mining provide iterative process so if results are not satisfied with optimal solution, the mining steps will continue to be carried out until mining results are corresponding intention results. For training and testing of WNIDS in our experiment, we used collected dataset called it W data set, the collection done on an organized WLAN 802.11 consist of 5 machines. The collection of data involved frames from all types (normal and the four known intrusions and unknown intrusion).The collected connections contain features those appear directly in the header of 802.11 frames and we added one more feature (casting) since it is critical in distinguish among intrusions. These connections are labelled as either normal or attack type, many of these features are irrelative in classification process. Here we propose Support Vector Machine SVM classifier as feature extraction to reduce no. of features to avoid time consuming in training and real-time detecting. SVM introduce 8 features as subset of correlated intrinsic features present the basic point in classification. The sets of features that have been resulted from SVM and the all features set will be the feeding of WNIDS. The results obtained from WNIDS showing that accuracy rate of ANN and ID3 classifiers are both higher with SVM (8) features than set of all features. And absolutely, ANN accuracy is higher than ID3 with both sets of features.
References
1. A. Boukerche, R.B. Machado, K.R.L. Juca´ , J.B.M. Sobral, and M.S.M.A. Notare, “An Agent Based and Biological Inspired Real- Time Intrusion Detection and Security Model for Computer Network Operations,” Computer Comm., vol. 30, no. 13, pp. 2649- 2660, Sept. 2007.
2. A. Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, “An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems,” Parallel Computing, vol. 30, nos. 5/6, pp. 629-646, 2004.
3. A. Boukerche and M.S.M.A. Notare, “Behavior-Based Intrusion Detection in Mobile Phone Systems,” J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.
4. Y. Chen, Y. Li, X. Cheng, and L. Guo, “Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System,” Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.
5. H. Liu and H. Motoda, Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, 1998.
6. http://kdd.ics.uci.edu/databases/kddcup99/task.html, 2010.
7. A.H. Sung and S. Mukkamala, “The Feature Selection and Intrusion Detection Problems,” Proc. Ninth Asian Computing Science Conf., 2004.
8. A.H. Sung and S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks,” Proc. Symp. Applications and the Internet (SAINT ’03), Jan. 2003.
9. G. Stein, B. Chen, A.S. Wu, and K.A. Hua, “Decision Tree Classifier for Network Intrusion Detection with GA-Based Feature Selection,” Proc. 43rd ACM Southeast Regional Conf.—Volume 2, Mar. 2005.
References
Feature selection, intrusion detection systems, K-means, information gain ratio, wireless networks, neural networks.