Call for Paper

CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.

Read More

Feature or Attribute Extraction for Intrusion Detection System using Gain Ratio and Principal Component Analysis (PCA)

O. Isaiah Aladesote, Agbelusi Olutola, Olasehinde Olayemi. Published in System Architecture.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: O. Isaiah Aladesote, Agbelusi Olutola, Olasehinde Olayemi
10.5120/cae2016652032

Isaiah O Aladesote, Agbelusi Olutola and Olasehinde Olayemi. Article: Feature or Attribute Extraction for Intrusion Detection System using Gain Ratio and Principal Component Analysis (PCA). Communications on Applied Electronics 4(3):1-4, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {O. Isaiah Aladesote and Agbelusi Olutola and Olasehinde Olayemi},
	title = {Article: Feature or Attribute Extraction for Intrusion Detection System using Gain Ratio and Principal Component Analysis (PCA)},
	journal = {Communications on Applied Electronics},
	year = {2016},
	volume = {4},
	number = {3},
	pages = {1-4},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Intrusion detection systems (IDS) refer to a category of defense tools that is used to provide warnings indicating that a system is under attack or intrusion. The IDS monitors activities within a network and alerts security administrators of suspicious activities. This paper extracted significant or highly relevant features or attributes of the Knowledge Discovery and Data Mining 1999 (KDD ’99) dataset, which is a standard benchmark dataset for all intrusion problems using two features extraction techniques: Gain Ratio for discrete attributes and Principal Component Analysis (PCA) for continuous attributes. C# Programming language was used for the implementation. Also, Microsoft Excel was used to depict the result of the extraction. The result shows that thirteen (13) attributes were highly relevant and significant.

References

  1. Ankita G., and Richariya V. (2007): “A Layered Approach for Intrusion Detection using Meta- modelling with Classification Techniques,” International Journal of Computer Technology & Electronics Engineering (IJCTEE) Vol. 1, Issues 2.
  2. Asha Gowda Karegowda, A. S. Manjunati & M. A. Jayaram (2010): “Comparative Study of Attributes Selection using Gain Ratio and Correlation Based Feature Selection”, International Journal of Information Technology and Knowledge Management. Volume 2, No. 2, pp. 271 – 277, July – December 2010.
  3. Dharamraj R. Patil and V. P. Kshirsagar (2010): “An overview of adaboost-based NISD and Performance evaluation on NSL –KDD dataset”, International Journal of Computer Engineering and Computer Application, vol. 1, 2010.
  4. Flora S. T. (2009), “Network Intrusion Detection using Associative Rules,” International Journal of Recent Trends in Engineering, Vol. 2, No. 2, November 2009.
  5. Jaiganesh, V. and Sumathi, P. (2012): “Intrusion Detection using Kernelized Support Vector Machine with Levenberg – Marquardt Learning”, International Journal of Engineering Science and Technology (IJEST), vol. 4 No. 03, pp. 1153 – 1160, March 2012.
  6. Kayacik, H. G., Zincir-Heywood, A. N, and Heywood M. I. (1999): “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD ’99 Intrusion Detection Datasets,” http://www.cs.dal.ca/projectx/
  7. KDD Cup 1999 Data: Available on http://kdd.ics.uci.edu/database/kddcup99/Database/kddcup99/kddcup99.html, October 2007
  8. Mrutyunjaya Panda and Manas Ranjan Patra (2007): “Network Intrusion Detection using Naive Bayes”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 7, No. 12, December 2007.
  9. Rupati D, and Bhupendra V. (2010): “Feature Reduction for Intrusion Detection using Linear Discriminant Analysis”, International Journal on Computer Science and Engineering (IJCSE) Vol. 02, No. 04, 2010, 1072 – 1078.
  10. Shilpa, L., Joseph S., and Bhupendra V. (2010): “Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD,” International Journal of Engineering Science and Technology, vol. 2(6), 2010, 1970 – 1977.
  11. Tsai F. S., Chan C. K. (eds), Cyber Security, Pearson Education, Singapore, 2006.

Keywords

Gain Ratio, Principal Component Analysis (PCA), Microsoft Excel, KDD ’99 dataset, Intrusion Detection System