Survei Teknik Pemilihan Fitur Untuk Sistem Deteksi Intrusi Berbasis Machine Learning

Authors

  • Ramli Ahmad Universitas Hamzanwadi

DOI:

https://doi.org/10.29408/jit.v8i1.28657

Keywords:

Feature Selection, Intrusion Detection System, FS methods

Abstract

With the increasing threat to cybersecurity, Machine Learning (ML)-based Intrusion Detection Systems (IDS) are becoming increasingly important for detecting and preventing network attacks. The selection of appropriate features is a key factor in improving the performance of IDS, as it can enhance detection accuracy, reduce model complexity, and save computation time. This article examines various feature selection techniques used in ML-based IDS, including filter, wrapper, embedded, and hybrid techniques. Each technique has its advantages and disadvantages, depending on the characteristics of the dataset and the type of attack encountered. This research also evaluates the effectiveness of these techniques using popular datasets such as KDD Cup 99, NSL-KDD, and CICIDS 2017. The results show that filter techniques are more efficient in terms of time, while wrapper and hybrid techniques offer higher detection accuracy, although they require more resources. The embedded technique combines efficiency and accuracy with time savings in model training. This article also discusses the importance of good feature selection for classification in IDS, as well as the challenges faced by IDS in overcoming its limitations. This research provides a comprehensive overview of feature selection in ML-based IDS and recommendations for further development and implementation to address increasingly complex threats.

References

T. Chen, X. Pan, Y. Xuan, J. Ma, and J. Jiang, “A Naive Feature Selection Method and Its Application in Network Intrusion Detection,” 10th Proc. Int. Conf. Comput. Intell. Secur., pp. 416–420, 2010.

C. Guo, Y. Zhou, Y. Ping, Z. Zhang, G. Liu, and Y. Yang, “A distance sum-based hybrid method for intrusion detection,” Appl. Intell., vol. 40, Jan. 2014.

V. R. Balasaraswathi, M. Sugumaran, and Y. Hamid, “Feature Selection Techniques for Intrusion Detection using Non-Bio-Inspired and Bio-Inspired Optimization Algorithms,” J. Commun. Inf. Networks, pp. 107–119, 2017.

S. Vanaja and K. Ramesh Kumar, “Analysis of Feature Selection Algorithms on Classification: A Survey,” Int. J. Comput. Appl., vol. 96, pp. 28–35, 2014.

S. Aljawarneh, M. Aldwairi, M. Yasin, and M. B. Yassein, “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model,” J. Comput. Sci., vol. 25, pp. 152–160, Mar. 2017.

A. Khraisat and A. Alazab, “A Critical Review of Intrusion Detection Systems in the Internet of Things: Techniques, Deployment Strategy, Validation Strategy, Attacks, Public Datasets and Challenges,” Cybersecurity, vol. 4, 2021.

L. Xiao and Y. Liu, A Two-step Feature Selection Algorithm Adapting to Intrusion Detection. IEEE, 2009.

V. Bolón-Canedo, I. Porto-Díaz, N. Sánchez-Maroño, and A. Alonso-Betanzos, “A Framework for Cost-based Feature Selection,” Pattern Recognit., vol. 47, pp. 2481–2489, 2014.

T. Hamed, R. Dara, and S. C. Kremer, “An Accurate, Fast Embedded Feature Selection for SVMS,” Proc. - 2014 13th Int. Conf. Mach. Learn. Appl. ICMLA 2014, pp. 135–140, 2014.

A. E. Ibor, F. A. Oladeji, O. B. Okunoye, and O. O. Ekabua, “Conceptualisation of Cyberattack prediction with deep learning,” Cybersecurity, vol. 3, pp. 1–14, Jun. 2020.

A. I. Madbouly and T. M. Barakat, “Enhanced Relevant Feature Selection Model for Intrusion Detection Systems,” Int. J. Intell. Eng. Informatics, vol. 4, p. 21, 2016.

S. Zaman, M. El-Abd, and F. Karray, “Features Selection Approaches for Intrusion Detection Systems based on Evolutionary Algorithms,” 3rd Int. Conf. Signals, Circuits Syst., pp. 1–5, 2009.

B. Remeseiro, V. Bolon-Canedo, and V. Bolón-Canedo, “A review of feature selection methods in medical applications,” Comput. Biol. Med., vol. 112, p. 103375, Jul. 2019.

M. Thejaswee, P. Srilakshmi, G. Karuna, and K. Anuradha, Hybrid IG and GA based Feature Selection Approach for Text Categorization, vol. 4. 2020.

C. Lazar et al., “A Survey on Filter Techniques for Feature Selection in Gene Expression Microarray Analysis,” IEEE/ACM Trans. Comput. Biol. Bioinform., vol. 9, pp. 1106–1119, Feb. 2012.

N. K. Suchetha, A. Nikhil, and P. Hrudya, “Comparing the Wrapper Feature Selection Evaluators on Twitter Sentiment Classification,” 2nd Int. Conf. Comput. Intell. Data Sci. Proc., vol. 2, pp. 1–6, 2019.

X. Zhu, Z. Zhu, and Y. Xiong, Aircraft Recognition Based on Feature Fusion and Feature Selection, vol. 5. IEEE, 2019.

F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, “Mutual information-based feature selection for intrusion detection systems,” J. Netw. Comput. Appl., vol. 34, pp. 1184–1199, Jul. 2011.

S. K. Pandey, “Design and Performance Analysis of Various Feature Selection Methods for Anomaly-based Techniques in Intrusion Detection System,” Secur. Priv., 2019.

S. Sheen and R. Rajesh, “Network Intrusion Detection using Feature Selection and Decision Tree Classifier,” 10th Int. Conf. Proc. /TENCON, pp. 1–4, 2008.

M. Ambusaidi, X. He, P. Nanda, and Z. Tan, “Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm,” IEEE Trans. Comput., vol. 65, Oct. 2016.

A. KumarShrivas and A. Kumar Dewangan, “An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set,” Int. J. Comput. Appl. India, vol. 99, pp. 8–13, 2014.

H. Nguyen, K. Franke, and S. Petrović, “Improving Effectiveness of Intrusion Detection by Correlation Feature Selection,” 5th Int. Conf. Availability, Reliab. Secur., pp. 17–24, 2010.

O. Osanaiye, H. Cai, K.-K. K. R. Choo, A. Dehghantanha, Z. Xu, and M. E. Dlodlo, “Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing,” EURASIP J. Wirel. Commun. Netw., vol. 2016, May 2016.

B. Pes, “Ensemble feature selection for high-dimensional data: a stability analysis across multiple domains,” Neural Comput. Appl., vol. 32, May 2020.

D. Selvamani and V. Selvi, “A Comparative Study on the Feature Selection Techniques for Intrusion Detection System,” Asian J. Comput. Sci. Technol., vol. 8, pp. 42–47, Feb. 2019.

J. R. Vergara and P. A. Estévez, “A Review of Feature Selection Methods based on Mutual Information,” Neural Comput. Appl., vol. 24, 2014.

H. M. Aydin, M. A. Ali, and E. G. Soyak, “Faster Wi-Fi Fingerprinting Using Feature Selection,” 28th Signal Process. Commun. Appl. Conf. Proc., pp. 1–4, 2020.

C. Khammassi and S. Krichen, “A GA-LR Wrapper Approach for Feature Selection in Network Intrusion Detection,” Comput. Secur., vol. 70, no. October, pp. 255–277, 2017.

K. Atefi, S. Yahya, A. Y. Dak, and A. Atefi, “A Hybrid Intrusion Detection System Based on Different Machine Learning Algorithms,” Int. Conf. Comput. Informatics, ICOCI, pp. 1–6, 2013.

Y. Hua, “An Efficient Traffic Classification Scheme Using Embedded Feature Selection and LightGBM,” Inf. Commun. Technol. Conf. ICTC, pp. 125–130, 2020.

J. Zhang, Y. Ling, X. Fu, X. Yang, G. Xiong, and R. Zhang, “Model of the Intrusion Detection System based on the Integration of Spatial-Temporal Features,” Comput. Secur., vol. 89, p. 101681, 2020.

W. Du, Z. Cao, T. Song, Y. Li, and Y. Liang, “A Feature Selection Method based on Multiple Kernel Learning with Expression Profiles of Different Types,” BioData Min., vol. 10, no. 4, pp. 313–325, 2017.

K. Kumar, G. Kumar, and Y. Kumar‏, “Feature Selection Approach for Intrusion Detection System‏,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 2, no. 5, pp. 47–53, 2013.

W. C. Lin, S. W. Ke, and C. F. Tsai, “CANN: An Intrusion Detection System based on Combining Cluster Centers and Nearest Neighbors,” Knowledge-Based Syst., vol. 78, 2015.

S. L. Shiva Darshan and C. D. Jaidhar, “Performance Evaluation of Filter-based Feature Selection Techniques in Classifying Portable Executable Files,” Procedia Comput. Sci., vol. 125, pp. 346–356, 2018.

E. Pitt and R. Nayak, “The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset,” Conf. Res. Pract. Inf. Technol. Ser., vol. 84, pp. 83–93, 2007.

L. Yu and H. Liu, “Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution,” in Proceedings, Twentieth International Conference on Machine Learning, 2003, pp. 856–863.

Amrita and P. Ahmed, “A Study of Feature Selection Methods in Intrusion Detection System : A Survey,” Int. J. Comput. Sci. Eng. Inf. Technol. Res., vol. 2, no. 3, pp. 1–25, 2012.

Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, “An Efficient Intrusion Detection System based on Support Vector Machines and Gradually Feature Removal Method,” Expert Syst. Appl., vol. 39, no. 1, pp. 424–430, 2012.

Z. Xue-qin, G. Chun-hua, L. Jia-jin, X. Q. Zhang, C. H. Gu, and J. J. Lin, “Intrusion Detection System Based on Feature Selection and Support Vector Machine,” 1st Int. Conf. Commun. Netw., pp. 1–5, Oct. 2006.

I. Sumaiya Thaseen and C. Aswani Kumar, “Intrusion Detection Model using Fusion of Chi-square Feature Selection and Multi Class SVM,” J. King Saud Univ. - Comput. Inf. Sci., vol. 29, no. 4, pp. 462–472, 2017.

S. Cang and H. Yu, “Mutual Information based Input Feature Selection for Classification Problems,” Decis. Support Syst., vol. 54, pp. 691–698, 2012.

Z. Zhang and E. R. Hancock, “Mutual Information Criteria for Feature Selection,” Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7005, pp. 235–249, 2011.

M. T.-S. Noelia S´anchez-Maro˜no, Amparo Alonso-Betanzos, “Filter Methods for Feature Selection. A Comparative Study,” 8th Int. Conf. Intell. Data Eng. Autom. Learn. - IDEAL, Birmingham, UK, vol. 4881, pp. 178–187, 2007.

M. K. Sohrabi and F. Karimi, “A Feature Selection Approach to Detect Spam in the Facebook Social Network,” Arab. J. Sci. Eng., vol. 43, Oct. 2017.

B. Venkatesh and J. Anuradha, “A Review of Feature Selection and its Methods,” Cybern. Inf. Technol., vol. 19, p. 3, 2019.

M. Cherrington, F. Thabtah, J. J. Lu, and Q. Xu, Feature Selection: Filter Methods Performance Challenges. IEEE, 2019.

S. Sun, Q. Peng, and A. Shakoor, “A Kernel-based Multivariate Feature Selection Method for Microarray Data Classification,” PLoS One, vol. 9, no. 7, p. e102541, 2014.

Z. K. Ibrahim, M. Y. Thanon, Z. Khalid, and M. Thanoun, Performance Comparison of Intrusion Detection System Using Three Different Machine Learning Algorithms. 2021.

R. P. Priyadarsini and S. Sivakumari, “Gain Ratio Based Feature Selection Method for Privacy Preservation,” ICTACT J. SOFT Comput., vol. 01, pp. 201–205, 2011.

W. Gómez, L. Leija, and A. Díaz-Pérez, “Mutual Information and Intrinsic Dimensionality for Feature Selection,” 7th Int. Conf. Electr. Eng. CCE, pp. 339–344, 2010.

G. Wu and J. Xu, “Optimized Approach of Feature Selection Based on Information Gain,” Int. Conf. Comput. Sci. Mech. Autom. CSMA, pp. 157–161, 2015.

S. Shimamura and K. Hirata, “Iterative Feature Selection Based on Binary Consistency,” 6th Int. Congr. Adv. Appl. Informatics, AAI, pp. 397–400, 2017.

N. Gopika and A. E. A. Meena Kowshalaya, “Correlation Based Feature Selection Algorithm for Machine Learning,” 3rd Int. Conf. Commun. Electron. Syst. ICCES, pp. 692–695, 2018.

Salimeh Yasaei Sekeh and Alfred O. Hero, “Feature Selection for Multi-Labeled Variables Via Dependency Maximization,” ICASSP 2019, pp. 3127–3131, 2019.

Y. Chen, L. Zhang, J. Li, and Y. Shi, “Domain Driven Two-phase Feature Selection Method based on Bhattacharyya Distance and Kernel Distance Measurements,” Int. Jt. Conf. Web Intell. Intell. Agent Technol. - WI-IAT, pp. 217–220, 2011.

P. H. Bugatti, M. X. Ribeiro, A. J. M. Traina, and C. Traina, “Content-based Retrieval of Medical Images by Continuous Feature Selection,” Proc. - IEEE Symp. Comput. Med. Syst., pp. 272–277, 2008.

M. S. Pagare and Y. R. Risodkar, “Low-Rank and Sparse Representation for Anomaly Detection in Hyperspectral Images,” Int. Conf. Adv. Commun. Comput. Technol. ICACCT, pp. 594–597, 2018.

A. Alzubaidi and G. Cosma, “A Multivariate Feature Selection Framework for High Dimensional Biomedical Data Classification,” IEEE Conf. Comput. Intell. Bioinforma. Comput. Biol. CIBCB, pp. 1–8, 2017.

C. Liu, Y. Liu, Y. Yan, and J. Wang, “An Intrusion Detection Model with Hierarchical Attention Mechanism,” IEEE Access, vol. 8, pp. 67542–67554, 2020

Downloads

Published

20-01-2025

How to Cite

Ahmad, R. (2025). Survei Teknik Pemilihan Fitur Untuk Sistem Deteksi Intrusi Berbasis Machine Learning. Infotek: Jurnal Informatika Dan Teknologi, 8(1), 317–323. https://doi.org/10.29408/jit.v8i1.28657

Most read articles by the same author(s)

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.