EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System

EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System

Preethi D., Neelu Khare
Copyright: © 2020 |Pages: 15
DOI: 10.4018/IJeC.2020100106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this article, an EFS-LSTM, a deep recurrent learning model, is proposed for network intrusion detection systems. The EFS-LSTM model uses ensemble-based feature selection (EFS) and LSTM (Long Short Term Memory) for the classification of network intrusions. The EFS combines five feature selection mechanisms namely, information gain, gain ratio, chi-square, correlation-based feature selection, and symmetric uncertainty-based feature selection. The experiments were conducted using the benchmark NSL-KDD dataset and implemented using Tensor flow and python. The EFS-LSTM classifier is evaluated using the classification performance metrics and also compared with all the 41 features without any feature selection as well as with each individual feature selection techniques and classified using LSTM. The performance study showed that the EFS-LSTM model outperforms better with 99.8% accuracy with a higher detection and less false alarm rates.
Article Preview
Top

Introduction

The challenge in network security is to implement efficient IDS and the solutions existing today focuses on signature-based and anomaly-based techniques. These techniques suffer from high false error rates and computing costs. In recent years, the research in the field of network IDS focuses on the shallow machine learning mechanisms say, KNN (Li et al., 2017), SVM (Ahmad et al., 2018), Naive Bayes, Random Forest (Farnaaz & Jabbar, 2016; Ahmad et al., 2018), Decision trees, ANN (Manzoor & Kumar, 2017). The application of shallow learning algorithms has offered improved detection accuracy. On the other hand, these methods are prone to some limitations. These methods need domain expert knowledge to identify useful patterns from the data; the computing cost is expensive, and it is likely prone to errors.

To address these limitations in our proposed work, we have applied the new research area deep learning (LeCun et al., 2015), which is receiving attention in many domains. Deep Learning is the subcategory of machine learning algorithms that operates better than shallow learning algorithms. Deep learning focuses on the faster detection of network anomalies as well as more in-depth network data analysis.

Current researches have revealed that the combination of feature selection mechanisms would enhance the results of the classifiers through the identification of weak features that acts strong in groups, eliminating the duplicate features, and identifying features with a higher correlation rate (Osanaiye et al., 2016). Other research works have suggested a hybrid feature selection strategy that incorporates filter and wrapper methods. In a filter-based technique, the choice of features is one of the contemporary strategies that incorporate space search and ranking techniques. Hence, we develop an Ensemble-based Feature Selection (EFS) technique that merges from the result of Information Gain, Gain Ratio, Chi-Square, Correlation-based Feature Selection and Symmetric Uncertainty based Feature Selection to choose the essential features. The primary objective of this suggested model is to significantly decrease the number of features and classify intrusions using the classifier Long Short Term Memory (Hochreiter & Schmidhuber, 1997). NSL-KDD (Tavallaee et al., 2009) is used to assess the efficiency of our suggested EFS-LSTM technique using the Waikato knowledge assessment environment and python.

The main contributions of this work consist of the following:

  • We design an efficient EFS-LSTM based classifier model for classification of network intrusions;

  • The benchmark NSL–KDD dataset used for the experimentation and testing of the proposed model;

  • We compare the performance of the proposed EFS–LSTM with existing feature selection techniques.

The rest of the paper is discussed in the following sections. Section 2 examines the related works. Section 3 discusses the suggested strategy for network intrusion detection based on EFS–LSTM. Section 4 presents the experimental result and comparison with the existing feature selection methods.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing