Analisis Komparatif Feture Selection dan Metode Klasifikasi Intrution Detection System (IDS)

Authors

DOI:

https://doi.org/10.29408/jit.v8i2.31103

Keywords:

Chi square, Gini Index, Information Gain, Relief, Uncertainty, Gain Ratio, Random Forest, SVM, Naive Bayes, AdaBoost, Neural Network, Intrusion Detection System (IDS), Feature Selection

Abstract

An Intrusion Detection System (IDS) is a computer system that analyzes user traffic and data on a network. IDS will provide a warning signal to network users that are attacked by intruders. However, IDS still needs to be developed due to the ever-evolving attack pattern. Feature Selection and Classification Network data are important components of IDS development to identify attack patterns based on network traffic data. To identify attack patterns, many researchers have proposed Feature Selection methods such as Chi-square, Gini Index, Information Gain, Relief, Gain Ratio, and Uncertainty. Researchers have also proposed Machine Learning Classification methods such as Random Forest, SVM, Naive Bayes, AdaBoost, and Neural Network. However, among the methods they propose, the Selection and Classification of Features method, the best, has not been studied. Therefore, we propose to conduct a comparative study of this method to find a better method of selection and classification of features. This study compares Feature Selection and Classification methods to identify those suitable for IDS by comparing Recall, Precision, F1, Accuracy, and Area Under Curve (AUC) for each method. The results showed that the Gain Ratio Feature Selection method was better than other Feature Selection methods. In addition, this study shows that the AdaBoost classification method is more accurate than other classification methods.

References

[1] Z. K. Ibrahim, M. Y. Thanon, Z. Khalid, and M. Thanoun, Performance Comparison of Intrusion Detection System Using Three Different Machine Learning Algorithms. 2021.

[2] N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A Deep Learning Approach to Network Intrusion Detection,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, 2018, doi: 10.1109/TETCI.2017.2772792.

[3] I. Sumaiya Thaseen and C. Aswani Kumar, “Intrusion Detection Model using Fusion of Chi-square Feature Selection and Multi Class SVM,” J. King Saud Univ. - Comput. Inf. Sci., vol. 29, no. 4, pp. 462–472, 2017, doi: https://doi.org/10.1016/j.jksuci.2015.12.004.

[4] L. Wu and Y. Wang, “Fusing Gini Index and Term Frequency for Text Feature Selection,” IEEE Third Int. Conf. Multimed. Big Data, 2017.

[5] M. T.-S. Noelia S´anchez-Maro˜no, Amparo Alonso-Betanzos, “Filter Methods for Feature Selection. A Comparative Study,” 8th Int. Conf. Intell. Data Eng. Autom. Learn. - IDEAL, Birmingham, UK, vol. 4881, pp. 178–187, 2007, doi: https://doi.org/10.1007/978-3-540-77226-2_19.

[6] R. Fu, P. Wang, Y. Gao, and X. Hua, “A new feature selection method based on relief and SVM-RFE,” Int. Conf. Signal Process. Proceedings, ICSP, 2014.

[7] A. Binbusayyis and T. Vaiyapuri, “Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach,” IEEE Access, vol. PP, pp. 106495–106513, Jul. 2019, doi: 10.1109/ACCESS.2019.2929487.

[8] C. Callegari, S. Giordano, and M. Pagano, “An information-theoretic method for the detection of anomalies in network traffic,” Comput. Secur., vol. 70, pp. 351–365, 2017, doi: 10.1016/j.cose.2017.07.004.

[9] K. Hassine, A. Erbad, and R. Hamila, “Important complexity reduction of random forest in multi-classification problem,” 2019 15th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2019, vol. 14, 2019.

[10] A. N. Jaber and S. U. Rehman, “FCM–SVM based intrusion detection system for cloud computing environment,” Cluster Comput., vol. 23, no. 4, pp. 3221–3231, 2020, doi: 10.1007/s10586-020-03082-6.

[11] M. K. Hooshmand, “Machine Learning Based Network Anomaly Detection,” Int. J. Recent Technol. Eng., vol. 8, no. 4, pp. 542–548, 2019, doi: 10.35940/ijrte.d7271.118419.

[12] A. I. Madbouly and T. M. Barakat, “Enhanced Relevant Feature Selection Model for Intrusion Detection Systems,” Int. J. Intell. Eng. Informatics, vol. 4, p. 21, 2016, doi: 10.1504/IJIEI.2016.074499.

[13] H. H. He, X. Sun, H. H. He, G. Zhao, L. He, and J. Ren, “A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection,” IEEE Access, vol. 7, pp. 183207–183221, 2019, doi: 10.1109/ACCESS.2019.2959131.

[14] D. Selvamani and V. Selvi, “A Comparative Study on the Feature Selection Techniques for Intrusion Detection System,” Asian J. Comput. Sci. Technol., vol. 8, pp. 42–47, Feb. 2019, doi: 10.51983/ajcst-2019.8.1.2120.

[15] I. S. V. Navdeep, “Linear Discriminant Analysis based Hybrid SVM- CART for Intrusion Detection System,” Int. J. Eng. Dev. Res., vol. 3, no. 4, 2015.

[16] T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review,” Procedia Comput. Sci., 2020, doi: https://doi.org/10.1016/j.procs.2020.04.133.

[17] P. Kushwaha, H. Buckchash, and B. Raman, “Anomaly based Intrusion Detection using Filter based Feature Selection on KDD-CUP 99,” Int. Conf. Proceedings/TENCON, pp. 839–844, 2017.

[18] M. Ahmed, A. Naser Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” J. Netw. Comput. Appl., vol. 60, pp. 19–31, 2016, doi: 10.1016/j.jnca.2015.11.016.

[19] B. Selvakumar and K. Muneeswaran, “Firefly algorithm based feature selection for network intrusion detection,” Comput. Secur., vol. 81, pp. 148–155, 2019, doi: 10.1016/j.cose.2018.11.005.

[20] S. Mohammadi, H. Mirvaziri, M. Ghazizadeh-Ahsaee, and H. Karimipour, “Cyber intrusion detection by combined feature selection algorithm,” J. Inf. Secur. Appl., vol. 44, pp. 80–88, 2019, doi: 10.1016/j.jisa.2018.11.007.

[21] F. E. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism,” J. Big Data, vol. 8, no. 1, 2021, doi: 10.1186/s40537-021-00544-5.

[22] M. Khudadad and Z. Huang, “Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 227, pp. 294–303, 2018.

[23] S. Oshima, T. Nakashima, and Y. Nishikido, “Extraction of characteristics of anomaly accessed IP packets using chi-square method,” Proc. Int. Conf. Complex, Intell. Softw. Intensive Syst. CISIS 2009, 2009.

[24] Y. Q. Minchao Ye, Yongqiu Xu, Huijuan Lu, Ke Yan and College, “Cross-Scene Feature Selection for Hyperspectral Images Based on Cross-Domain Information Gain,” IGARSS, 2018.

[25] O. Goldstein, M. Kachuee, K. Karkkainen, and M. Sarrafzadeh, “Target-Focused Feature Selection Using Uncertainty Measurements in Healthcare Data,” ACM Trans. Comput. Healthc., vol. 1, no. 3, pp. 1–17, May 2020, doi: 10.1145/3383685.

[26] R. P. Priyadarsini and S. Sivakumari, “Gain Ratio Based Feature Selection Method for Privacy Preservation,” ICTACT J. SOFT Comput., vol. 01, pp. 201–205, 2011, doi: 10.21917/ijsc.2011.0031.

[27] Z. Li and G. Yan, “A Spark Platform-based Intrusion Detection System by Combining MSMOTE and Improved Adaboost Algorithms,” IEEE, 2018, doi: 10.1109/ICSESS.2018.8663723.

[28] N. Farnaaz and M. A. Jabbar, “Random Forest Modeling for Network Intrusion Detection System,” 12th Int. Multi-Conference Information, IMCIP, vol. 89, pp. 213 – 217, 2016, doi: https://doi.org/10.1016/j.procs.2016.06.047.

[29] D. Nikolov, I. Kordev, and S. Stefanova, “Concept for network intrusion detection system based on recurrent neural network classifier,” Int. Sci. Conf. Electron., 2018.

[30] C. D. H. P. Fuhui Long, “Feature Selection Based on Mutual Information: Criteria of Max-Dependency, Max-Relevance, and Min-Redundancy,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, pp. 1226–1238, 2015, doi: 10.1109/TPAMI.2005.159.

[31] R. R. Reddy, Y. Ramadevi, and K. V. N. Sunitha, “Effective discriminant function for intrusion detection using SVM,” 2016 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, 2016.

[32] “ROC curve,” Cyber Data Scientist, 2022. https://cyberdatascientist.com/learning/cyber-data-scientist-workflow/evaluation/ (accessed Oct. 12, 2022).

Downloads

Published

15-07-2025

How to Cite

Ahmad, R., & Saiful, M. (2025). Analisis Komparatif Feture Selection dan Metode Klasifikasi Intrution Detection System (IDS). Infotek: Jurnal Informatika Dan Teknologi, 8(2), 673–685. https://doi.org/10.29408/jit.v8i2.31103

Most read articles by the same author(s)

1 2 3 > >> 

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.