The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier

Intrusion detection systems are used to detect and prevent the attacks in networks and databases. However, the increase in the dimension of the network dataset has become a major problem nowadays. Feature selection is used to reduce the dimension of the attributes present in those huge data sets. Classical Feature selection algorithms are based on Rough set theory, neighborhood rough set theory and fuzzy sets. Rough Set Attribute Reduction Algorithm is one of the major theories used for successfully reducing the attributes by removing redundancies. In this algorithm, significant features are selected data are extracted. In this paper, a new feature selection algorithm is proposed using the Maximum dependence Maximum Significance algorithm. This algorithm is used for selecting the minimal number of attributes of knowledge Discovery and Data (KDD) data set. Moreover, a new K-Nearest Neighborhood based algorithm proposed for classifying data set. This proposed feature selection algorithm considerably reduces the unwanted attributes or features and the classification algorithm finds the type of intrusion effectively. The proposed feature selection and classification algorithms are very efficient in detecting attacks and effectively reduce the false alarm rate.


[1] Bi J., Bennett K., Embrechts M., Breneman C., and Song M., “Dimensionality Reduction Via Sparse Support Vector Machines,” Journal of Machine Learning Research, vol. 3, pp.1229- 1243, 2003.

[2] Debar H., Me L., and Wu S., “Recent Advances in Intrusion Detection,” in Proceedings of the 3rd International Workshop, Toulouse, pp. 53, 2000.

[3] Debar H., Becker M., and Siboni D., “A Neural Network Component for an Intrusion Detection System,” in Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, pp. 240-250, 2012.

[4] Dy J., and Brodley C., “Feature Selection for Unsupervised Learning,” The Journal of Machine Learning Research Archive, vol. 5, pp. 845-889, 2004.

[5] Eesa A., Orman Z., and Brifcani A., “A Novel Feature-Selection Approach Based on the Cuttlefish Optimization Algorithm for Intrusion Detection Systems,” Expert Systems with Applications, vol. 42, no. 5, pp. 2670-2679, 2015.

[6] Forman G., “An Extensive Empirical Study of Feature Selection Metrics for Text Classification,” Journal of Machine Learning Research, vol. 3, pp. 1289-1305, 2003.

[7] Fossaceca J., Mazzuchi T., and Sarkani S., “MARK- ELM:Application of A Novel Multiple Kernel Learning Framework for Improving the Robustness of Network Intrusion Detection,” Expert Systems with Applications, vol. 42, no. 8, pp. 4062-4080, 2015.

[8] Ganapathy S., Vijayakumar P., Palanichamy Y., and Arputharaj K., “An Intelligent CRF Based Feature Selection for Effective Intrusion Detection,” The International Arab Journal of Information Technology, vol. 13, no. 1, pp. 44- 50, 2016.

[9] Gondaliya T. and Singh M., “Intrusion Detection System for Attack Prevention in Mobile Ad-Hoc Network,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, pp. 638-641, 2013.

[10] Hoque M., Abdul-Mukit M., and Abu- NaserBikas M., “An Implementation of Intrusion 752 The International Arab Journal of Information Technology, Vol. 16, No. 4, July 2019 Detection System Using Genetic Algorithm,” International Journal of Network Security and its Applications, vol. 4, no. 2, pp. 109-120, 2012.

[11] Jensena R., Tusonb A., and Shena Q., “Finding Rough and Fuzzy-Rough Set Reduces with SAT,” Information Sciences, vol. 255, pp. 100- 120, 2014.

[12] Kartit A., Saidi A., Bezzazi F., Marraki M., and Radi A., “A New Approach to Intrusion Detection System,” Journal of Theoretical and Applied Information Technology, vol. 36, no. 2, pp. 284-289, 2012.

[13] KDD Cup 1999 Intrusion Detection Data available at: http://kdd.ics.uci.edu/databases/kddcup99/kddcu p99.html, Last Visited, 2010.

[14] Law K. and Kwok L., “IDS False Alarm Filtering Using KNN Classifier,” in Proccedings of 5th International Workshop on Information Security Applications, Jeju Island, pp. 114-121, 2005.

[15] Maji P. and Garai P., “IT2 Fuzzy-Rough Sets and Max Relevance-Max Significance Criterion for Attribute Selection,” IEEE Transactions on Cybernetics, vol. 45, no. 8, pp. 1657-1668, 2015.

[16] Moradi M. and Zulkernine M., “A Neural Network based System for Intrusion Detection and Classification of Attacks,” in Proceedings of IEEE International Conference on Advances in Intelligent Systems-Theory and Applications, pp. 15-18, 2011.

[17] Mulay S., Devale P., and Garje G., “Intrusion Detection System using Support Vector Machine and Decision Tree,” International Journal of Computer Applications, vol. 3, no. 3, pp. 975- 987, 2010.

[18] Nader P., Honeine P., and Beauseroy., “Normsin One-Class Classificationfor Intrusion Detectionin SCADA Systems,” Industrial Informatics, IEEE Transactions, vol. 10, no. 4, pp. 2308-2317, 2014.

[19] Onut I. and Ghorbani A., “A Feature Classification Scheme for Network Intrusion Detection,” International Journal of Network Security, vol. 5, no. 1, pp. 1-15, 2007.

[20] Patel A., Taghavi M., Bakhtiya K., and Junior J., “An Intrusion Detection and Prevention System in Cloud Computing: A Systematic Review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 25-41, 2013.

[21] Qassim Q., Patel A., and Mohd-Zin A., “Strategy to Reduce False Alarms in Intrusion Detection and Prevention Systems,” The International Arab Journal of Information Technology, vol. 11, no. 5, pp. 500-506, 2014.

[22] Rajeswari L. and Arputharaj K., “An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm,” International Journal of Communications, Network and System Sciences, vol. 4, pp. 285-385, 2008.

[23] Ramaswami M. and Bhaskaran R., “A Study on Feature Selection Techniques in Educational Data Mining,” Journal of Computing, vol. 1, no. 1, pp. 7-11, 2009.

[24] Sarasamma S., Zhu Q., and Huff J., “Hierarchical Kohonen Net for Anomaly Detection in Network Security,” IEEE Transactions on System, Man, Cybernetics, Part Cybernetics, vol. 35, no. 2, pp. 302-312, 2005.

[25] Sathya S., Ramani R., and Sivaselvi K., “Discriminant Analysis based Feature Selection in KDD Intrusion Dataset,” International Journal of Computer Application, vol. 31, no. 11, pp. 1-7, 2011.

[26] Senthilnayaki B., Venkatalakshmi K., and Kannan A., “An Intelligent Intrusion Detection using Genetic based Feature Selection and Modified J48 Decision Tree Classifier,” in Proccedings of 5th International Conference on Advanced Computing, Chennai, pp. 1-7, 2013.

[27] Senthilnayaki B., Venkatalakshmi K., and Arputharaj K., “Intrusion Detection System Using Feature Selection and Classification Technique,” International Journal of Computer Science and Application, vol. 3, no. 4, pp. 145- 151, 2014.

[28] Shittu R., Healing A., Ghanea-Hercock R., Bloomfield R., and Rajarajan M., “Intrusion Alert Prioritisation And Attack Detection Using Post-Correlation Analysis,” Computers and Security, vol. 50, pp. 1-15, 2015.

[29] Sindhu S., Subbiah G., and Arputharaj K., “Decision Boundary based Light Weight Intrusion Detection using a Wrapper Approach,” Expert Systems with Applications, vol. 39, no. 1, pp. 129-141, 2012.

[30] Thongkanchorn K., Ngamsuriyaroj S., and Visoottiviseth V., “Evaluation Studies of Three Intrusion Detection Systems under Various Attacks and Rule Sets,” in Proceedings of IEEE International Conference of IEEE Region 10 (TENCON), Xi'an, pp. 1-4, 2013. Intrusion Detection System using Fuzzy Rough Set Feature Selection and ... 753 Balakrishnan Senthilnayaki has completed MTech and PhD at (CEG) Anna University, Chennai- 25. She has 7 years of teaching experience. Currently, she is working as a Teaching Fellow of the (CEG) Anna University, Chennai. She has 12 publications in journals and conference proceedings. Her areas of interest include Data Mining, DBMS and Soft Computing. Krishnan Venkatalakshmi has completed ME and PhD at Thigarajar Engineering College, Madurai. She has 15 years of teaching experience.Currently, She is head and Assistant Professor in the Department of Electronics and Communication Engineering at Anna University (UCET) Tindivanam. She has more than 53 publications in reputed journals and conference proceedings. Her area of interest includes Signal Processing, VLSI, Wireless Networks, Wireless Communication and Instrumentation. Arputharaj Kannan has completed ME and PhD at Anna University, Chennai-25. He has 25 years of teaching experience at Anna University. Currently, he is Professor and Head of the Department of Information Science and Technology at Anna University, Chennai. He has more than 225 publications in reputed journals and conference proceedings. His areas of interests include DBMS, Data Mining, Artificial Intelligent and Software Engineering.