Reference Hub6
An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms

An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms

Kavitha G., Elango N. M.
Copyright: © 2020 |Volume: 16 |Issue: 4 |Pages: 11
ISSN: 1548-3673|EISSN: 1548-3681|EISBN13: 9781799805182|DOI: 10.4018/IJeC.2020100104
Cite Article Cite Article

MLA

Kavitha G., and Elango N. M. "An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms." IJEC vol.16, no.4 2020: pp.48-58. http://doi.org/10.4018/IJeC.2020100104

APA

Kavitha G. & Elango N. M. (2020). An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms. International Journal of e-Collaboration (IJeC), 16(4), 48-58. http://doi.org/10.4018/IJeC.2020100104

Chicago

Kavitha G., and Elango N. M. "An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms," International Journal of e-Collaboration (IJeC) 16, no.4: 48-58. http://doi.org/10.4018/IJeC.2020100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The rapid development of various services that are provided by information technology has been widely accepted by the users who are making use of such services in their day-to-day life activities. Securing such a system application from various intrusions still remains to be a one of the major issues in the current era. Detecting such anomalies from the regular events involves various steps such as data pre-processing, feature selection, and classification. Many of the computational models intend to accurately discriminate the samples of each group for better classification by identifying candidate features prior to the learning phase. This research studies the implementation of a combined feature selection technique such as the GRRF-FWSVM method which is applied to the benchmarked anomaly detection dataset KDD CUP 99. The results prove the novel proposed hybrid model is an effective method in identifying anomalies and it increases the detection rate of about 98.55% of the intrusion detection system with the two most common benchmark models.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.